cve-2021-41002
Vulnerability from cvelistv5
Published
2022-03-02 21:40
Modified
2024-08-04 02:59
Severity ?
Summary
Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T02:59:31.058Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Multiple authenticated remote path traversal",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-03-02T21:40:31",
        "orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
        "shortName": "hpe"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security-alert@hpe.com",
          "ID": "CVE-2021-41002",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Multiple authenticated remote path traversal"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt",
              "refsource": "MISC",
              "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
    "assignerShortName": "hpe",
    "cveId": "CVE-2021-41002",
    "datePublished": "2022-03-02T21:40:31",
    "dateReserved": "2021-09-13T00:00:00",
    "dateUpdated": "2024-08-04T02:59:31.058Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.06.0001\", \"versionEndIncluding\": \"10.06.0170\", \"matchCriteriaId\": \"46EF92A4-497F-4E18-8EFB-CA65C6E13CBC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.07.0001\", \"versionEndIncluding\": \"10.07.0050\", \"matchCriteriaId\": \"3F9AB6C6-F5B1-462C-9225-4329C126D7AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.08.0001\", \"versionEndIncluding\": \"10.08.1030\", \"matchCriteriaId\": \"64D93409-2CFC-45B4-852F-3A8CD24E8EF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.09.0001\", \"versionEndIncluding\": \"10.09.0002\", \"matchCriteriaId\": \"6A6004E2-4C71-469F-9C40-470040E053C3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"486BF5C3-870B-47B7-9C0E-9B35DBE3F41C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35AC85B2-4960-4F61-B4DB-02598AF6E2E6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"535F4E94-337F-4EE7-8740-CFC5AF310736\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"257C95D3-8D0F-4878-BC17-DC888975E07C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2167087-2E82-4BD0-9791-C837B655A5EA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D8486D5-91D8-457D-BCED-6534768933ED\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4362AA75-7C76-4741-934F-B0BF75A7DB9C\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4801BD3A-ED8C-42F3-A631-3094A9A82913\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB1FBA66-B639-4B0C-A96F-FC74B01B45BB\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FCD1A83B-109B-4596-AE37-706751E2B57D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4D6F748F-89E9-45FB-8BE7-2201E5EB2755\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8066A871-2683-4F74-9750-E73BF004209F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"790C5E7A-3405-4873-83E8-4D9C0FEC5E6D\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.\"}, {\"lang\": \"es\", \"value\": \"Se han detectado m\\u00faltiples vulnerabilidades de salto de ruta remoto autenticadas en la interfaz de l\\u00ednea de comandos de AOS-CX en las versiones de la serie de conmutadores Aruba CX 6200F, la serie de conmutadores Aruba 6300, la serie de conmutadores Aruba 6400, la serie de conmutadores Aruba 8320, la serie de conmutadores Aruba 8325, la serie de conmutadores Aruba 8400 y la serie de conmutadores Aruba CX 8360: AOS-CX versiones 10.06.xxxx: 10.06.0170 y anteriores, AOS-CX versiones 10.07.xxxx: 10.07.0050 y anteriores, AOS-CX versiones 10.08.xxxx: 10.08.1030 y anteriores, AOS-CX versiones 10.09.xxxx: 10.09.0002 y anteriores. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX que abordan estas vulnerabilidades de seguridad\"}]",
      "id": "CVE-2021-41002",
      "lastModified": "2024-11-21T06:25:14.673",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H\", \"baseScore\": 8.1, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.2}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:S/C:N/I:C/A:C\", \"baseScore\": 8.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 8.0, \"impactScore\": 9.2, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2022-03-02T22:15:08.113",
      "references": "[{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt\", \"source\": \"security-alert@hpe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security-alert@hpe.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-22\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2021-41002\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2022-03-02T22:15:08.113\",\"lastModified\":\"2024-11-21T06:25:14.673\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.\"},{\"lang\":\"es\",\"value\":\"Se han detectado m\u00faltiples vulnerabilidades de salto de ruta remoto autenticadas en la interfaz de l\u00ednea de comandos de AOS-CX en las versiones de la serie de conmutadores Aruba CX 6200F, la serie de conmutadores Aruba 6300, la serie de conmutadores Aruba 6400, la serie de conmutadores Aruba 8320, la serie de conmutadores Aruba 8325, la serie de conmutadores Aruba 8400 y la serie de conmutadores Aruba CX 8360: AOS-CX versiones 10.06.xxxx: 10.06.0170 y anteriores, AOS-CX versiones 10.07.xxxx: 10.07.0050 y anteriores, AOS-CX versiones 10.08.xxxx: 10.08.1030 y anteriores, AOS-CX versiones 10.09.xxxx: 10.09.0002 y anteriores. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX que abordan estas vulnerabilidades de seguridad\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":8.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:S/C:N/I:C/A:C\",\"baseScore\":8.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.0,\"impactScore\":9.2,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-22\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.06.0001\",\"versionEndIncluding\":\"10.06.0170\",\"matchCriteriaId\":\"46EF92A4-497F-4E18-8EFB-CA65C6E13CBC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.07.0001\",\"versionEndIncluding\":\"10.07.0050\",\"matchCriteriaId\":\"3F9AB6C6-F5B1-462C-9225-4329C126D7AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.08.0001\",\"versionEndIncluding\":\"10.08.1030\",\"matchCriteriaId\":\"64D93409-2CFC-45B4-852F-3A8CD24E8EF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.09.0001\",\"versionEndIncluding\":\"10.09.0002\",\"matchCriteriaId\":\"6A6004E2-4C71-469F-9C40-470040E053C3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"486BF5C3-870B-47B7-9C0E-9B35DBE3F41C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35AC85B2-4960-4F61-B4DB-02598AF6E2E6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"535F4E94-337F-4EE7-8740-CFC5AF310736\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"257C95D3-8D0F-4878-BC17-DC888975E07C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2167087-2E82-4BD0-9791-C837B655A5EA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D8486D5-91D8-457D-BCED-6534768933ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4362AA75-7C76-4741-934F-B0BF75A7DB9C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4801BD3A-ED8C-42F3-A631-3094A9A82913\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB1FBA66-B639-4B0C-A96F-FC74B01B45BB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FCD1A83B-109B-4596-AE37-706751E2B57D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D6F748F-89E9-45FB-8BE7-2201E5EB2755\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8066A871-2683-4F74-9750-E73BF004209F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"790C5E7A-3405-4873-83E8-4D9C0FEC5E6D\"}]}]}],\"references\":[{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.