CVE-2021-29143 (GCVE-0-2021-29143)

Vulnerability from cvelistv5 – Published: 2021-07-22 13:31 – Updated: 2024-08-03 22:02
VLAI?
Summary
A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.
Severity ?
No CVSS data available.
CWE
  • remote execution of arbitrary commands
Assigner
hpe
References
Impacted products
Vendor Product Version
n/a Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series Affected: Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T22:02:50.516Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "remote execution of arbitrary commands",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-07-22T13:31:38",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2021-29143",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "remote execution of arbitrary commands"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt",
              "refsource": "MISC",
              "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2021-29143",
    "datePublished": "2021-07-22T13:31:38",
    "dateReserved": "2021-03-24T00:00:00",
    "dateUpdated": "2024-08-03T22:02:50.516Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.04.000\", \"versionEndExcluding\": \"10.04.3070\", \"matchCriteriaId\": \"53B1F32A-5105-4EBE-B109-00614703FB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.05.0000\", \"versionEndExcluding\": \"10.05.0070\", \"matchCriteriaId\": \"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.06.0000\", \"versionEndIncluding\": \"10.06.0110\", \"matchCriteriaId\": \"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.07.0000\", \"versionEndIncluding\": \"10.07.0001\", \"matchCriteriaId\": \"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:cx_6200f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CB3993F-B4A6-4016-AF0F-82A23FE34063\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.04.000\", \"versionEndExcluding\": \"10.04.3070\", \"matchCriteriaId\": \"53B1F32A-5105-4EBE-B109-00614703FB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.05.0000\", \"versionEndExcluding\": \"10.05.0070\", \"matchCriteriaId\": \"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.06.0000\", \"versionEndIncluding\": \"10.06.0110\", \"matchCriteriaId\": \"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.07.0000\", \"versionEndIncluding\": \"10.07.0001\", \"matchCriteriaId\": \"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:cx_6300:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C32F7E4-E184-4F76-8638-017DF29D2FFB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.04.000\", \"versionEndExcluding\": \"10.04.3070\", \"matchCriteriaId\": \"53B1F32A-5105-4EBE-B109-00614703FB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.05.0000\", \"versionEndExcluding\": \"10.05.0070\", \"matchCriteriaId\": \"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.06.0000\", \"versionEndIncluding\": \"10.06.0110\", \"matchCriteriaId\": \"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.07.0000\", \"versionEndIncluding\": \"10.07.0001\", \"matchCriteriaId\": \"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:cx_6400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A013EAE-387B-4C35-9D8F-E2200081E18E\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.04.000\", \"versionEndExcluding\": \"10.04.3070\", \"matchCriteriaId\": \"53B1F32A-5105-4EBE-B109-00614703FB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.05.0000\", \"versionEndExcluding\": \"10.05.0070\", \"matchCriteriaId\": \"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.06.0000\", \"versionEndIncluding\": \"10.06.0110\", \"matchCriteriaId\": \"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.07.0000\", \"versionEndIncluding\": \"10.07.0001\", \"matchCriteriaId\": \"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:cx_8320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C93CD9C-1FD4-4E4A-9E3A-8FF19DE0D3AE\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.04.000\", \"versionEndExcluding\": \"10.04.3070\", \"matchCriteriaId\": \"53B1F32A-5105-4EBE-B109-00614703FB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.05.0000\", \"versionEndExcluding\": \"10.05.0070\", \"matchCriteriaId\": \"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.06.0000\", \"versionEndIncluding\": \"10.06.0110\", \"matchCriteriaId\": \"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.07.0000\", \"versionEndIncluding\": \"10.07.0001\", \"matchCriteriaId\": \"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:cx_8325:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9645D616-077B-4313-B5EF-155B642CB073\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.04.000\", \"versionEndExcluding\": \"10.04.3070\", \"matchCriteriaId\": \"53B1F32A-5105-4EBE-B109-00614703FB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.05.0000\", \"versionEndExcluding\": \"10.05.0070\", \"matchCriteriaId\": \"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.06.0000\", \"versionEndIncluding\": \"10.06.0110\", \"matchCriteriaId\": \"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.07.0000\", \"versionEndIncluding\": \"10.07.0001\", \"matchCriteriaId\": \"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:cx_8360:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9440291-26BB-4BBD-84BA-B347484839F4\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.04.000\", \"versionEndExcluding\": \"10.04.3070\", \"matchCriteriaId\": \"53B1F32A-5105-4EBE-B109-00614703FB17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.05.0000\", \"versionEndExcluding\": \"10.05.0070\", \"matchCriteriaId\": \"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.06.0000\", \"versionEndIncluding\": \"10.06.0110\", \"matchCriteriaId\": \"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.07.0000\", \"versionEndIncluding\": \"10.07.0001\", \"matchCriteriaId\": \"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:cx_8400:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4FB7A6B-69C5-45EF-BE61-23BCF5172836\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.\"}, {\"lang\": \"es\", \"value\": \"Se ha detectado una vulnerabilidad de ejecuci\\u00f3n remota de comandos arbitrarios en Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series, versiones de firmware: Aruba AOS-CX : versiones 10.04.xxxx - anteriores a 10.04.3070, versiones 10.05.xxxx - anteriores a 10.05.0070, versiones 10.06.xxxx - anteriores a 10.06.0110, versiones 10.07.xxxx - anteriores a 10.07.0001. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX, que solucionan esta vulnerabilidad de seguridad\"}]",
      "id": "CVE-2021-29143",
      "lastModified": "2024-11-21T06:00:46.450",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.2, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.2, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:C/I:C/A:C\", \"baseScore\": 9.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2021-07-22T14:15:07.947",
      "references": "[{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt\", \"source\": \"security-alert@hpe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security-alert@hpe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-29143\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2021-07-22T14:15:07.947\",\"lastModified\":\"2024-11-21T06:00:46.450\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A remote execution of arbitrary commands vulnerability was discovered in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): Aruba AOS-CX firmware: 10.04.xxxx - versions prior to 10.04.3070, 10.05.xxxx - versions prior to 10.05.0070, 10.06.xxxx - versions prior to 10.06.0110, 10.07.xxxx - versions prior to 10.07.0001. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.\"},{\"lang\":\"es\",\"value\":\"Se ha detectado una vulnerabilidad de ejecuci\u00f3n remota de comandos arbitrarios en Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series, versiones de firmware: Aruba AOS-CX : versiones 10.04.xxxx - anteriores a 10.04.3070, versiones 10.05.xxxx - anteriores a 10.05.0070, versiones 10.06.xxxx - anteriores a 10.06.0110, versiones 10.07.xxxx - anteriores a 10.07.0001. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX, que solucionan esta vulnerabilidad de seguridad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.2,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:C/I:C/A:C\",\"baseScore\":9.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_6200f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CB3993F-B4A6-4016-AF0F-82A23FE34063\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_6300:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C32F7E4-E184-4F76-8638-017DF29D2FFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_6400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A013EAE-387B-4C35-9D8F-E2200081E18E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_8320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C93CD9C-1FD4-4E4A-9E3A-8FF19DE0D3AE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_8325:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9645D616-077B-4313-B5EF-155B642CB073\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_8360:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9440291-26BB-4BBD-84BA-B347484839F4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.04.000\",\"versionEndExcluding\":\"10.04.3070\",\"matchCriteriaId\":\"53B1F32A-5105-4EBE-B109-00614703FB17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.05.0000\",\"versionEndExcluding\":\"10.05.0070\",\"matchCriteriaId\":\"F1CD3AAE-04C8-4032-BB8E-3F4651793A1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0000\",\"versionEndIncluding\":\"10.06.0110\",\"matchCriteriaId\":\"37B1D827-1B60-4B35-B178-EFD9B3C9E13C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:aos-cx_firmware:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0000\",\"versionEndIncluding\":\"10.07.0001\",\"matchCriteriaId\":\"C5713C22-E3AB-415E-B7B8-1FB4B008AA65\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:cx_8400:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4FB7A6B-69C5-45EF-BE61-23BCF5172836\"}]}]}],\"references\":[{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-013.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…