FKIE_CVE-2021-41002
Vulnerability from fkie_nvd - Published: 2022-03-02 22:15 - Updated: 2024-11-21 06:25
Severity ?
Summary
Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hpe | arubaos-cx | * | |
| hpe | arubaos-cx | * | |
| hpe | arubaos-cx | * | |
| hpe | arubaos-cx | * | |
| hpe | aruba_8320 | - | |
| hpe | aruba_8325-32-c | - | |
| hpe | aruba_8325-48y8c | - | |
| hpe | aruba_8360-12c | - | |
| hpe | aruba_8360-16y2c | - | |
| hpe | aruba_8360-24xf2c | - | |
| hpe | aruba_8360-32y4c | - | |
| hpe | aruba_8360-48xt4c | - | |
| hpe | aruba_8400x | - | |
| hpe | aruba_cx_6200f | - | |
| hpe | aruba_cx_6300f | - | |
| hpe | aruba_cx_6300m | - | |
| hpe | aruba_cx_6405 | - | |
| hpe | aruba_cx_6410 | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "46EF92A4-497F-4E18-8EFB-CA65C6E13CBC",
"versionEndIncluding": "10.06.0170",
"versionStartIncluding": "10.06.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3F9AB6C6-F5B1-462C-9225-4329C126D7AB",
"versionEndIncluding": "10.07.0050",
"versionStartIncluding": "10.07.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "64D93409-2CFC-45B4-852F-3A8CD24E8EF6",
"versionEndIncluding": "10.08.1030",
"versionStartIncluding": "10.08.0001",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6A6004E2-4C71-469F-9C40-470040E053C3",
"versionEndIncluding": "10.09.0002",
"versionStartIncluding": "10.09.0001",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*",
"matchCriteriaId": "486BF5C3-870B-47B7-9C0E-9B35DBE3F41C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "35AC85B2-4960-4F61-B4DB-02598AF6E2E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "535F4E94-337F-4EE7-8740-CFC5AF310736",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "257C95D3-8D0F-4878-BC17-DC888975E07C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E2167087-2E82-4BD0-9791-C837B655A5EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D8486D5-91D8-457D-BCED-6534768933ED",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4362AA75-7C76-4741-934F-B0BF75A7DB9C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4801BD3A-ED8C-42F3-A631-3094A9A82913",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BB1FBA66-B639-4B0C-A96F-FC74B01B45BB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FCD1A83B-109B-4596-AE37-706751E2B57D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4D6F748F-89E9-45FB-8BE7-2201E5EB2755",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8066A871-2683-4F74-9750-E73BF004209F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*",
"matchCriteriaId": "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities."
},
{
"lang": "es",
"value": "Se han detectado m\u00faltiples vulnerabilidades de salto de ruta remoto autenticadas en la interfaz de l\u00ednea de comandos de AOS-CX en las versiones de la serie de conmutadores Aruba CX 6200F, la serie de conmutadores Aruba 6300, la serie de conmutadores Aruba 6400, la serie de conmutadores Aruba 8320, la serie de conmutadores Aruba 8325, la serie de conmutadores Aruba 8400 y la serie de conmutadores Aruba CX 8360: AOS-CX versiones 10.06.xxxx: 10.06.0170 y anteriores, AOS-CX versiones 10.07.xxxx: 10.07.0050 y anteriores, AOS-CX versiones 10.08.xxxx: 10.08.1030 y anteriores, AOS-CX versiones 10.09.xxxx: 10.09.0002 y anteriores. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX que abordan estas vulnerabilidades de seguridad"
}
],
"id": "CVE-2021-41002",
"lastModified": "2024-11-21T06:25:14.673",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "COMPLETE",
"baseScore": 8.5,
"confidentialityImpact": "NONE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.0,
"impactScore": 9.2,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-02T22:15:08.113",
"references": [
{
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt"
}
],
"sourceIdentifier": "security-alert@hpe.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-22"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…