VAR-202110-1632
Vulnerability from variot - Updated: 2023-12-18 10:57A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability. Provides the only Wi-Fi solution that is easy to set up.
Aruba Instant has a command injection vulnerability, which is caused by incorrect input validation in the web interface. Attackers use the vulnerability to send elaborate HTTP requests to the application and execute arbitrary OS commands on the target system
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202110-1632",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "aruba instant",
"scope": "gte",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "8.6.0.0"
},
{
"model": "scalance w1750d",
"scope": "lt",
"trust": 1.0,
"vendor": "siemens",
"version": "8.7.1.3"
},
{
"model": "aruba instant",
"scope": "lt",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "6.5.4.19"
},
{
"model": "aruba instant",
"scope": "lt",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "8.7.1.1"
},
{
"model": "aruba instant",
"scope": "gte",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "6.5.4.0"
},
{
"model": "aruba instant",
"scope": "gte",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "6.4.0.2-4.1.0.0"
},
{
"model": "aruba instant",
"scope": "lt",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "8.5.0.12"
},
{
"model": "aruba instant",
"scope": "gte",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "8.7.0.0"
},
{
"model": "aruba instant",
"scope": "lt",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "8.6.0.7"
},
{
"model": "aruba instant",
"scope": "lt",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "6.4.4.8-4.2.4.18"
},
{
"model": "aruba instant",
"scope": "gte",
"trust": 1.0,
"vendor": "arubanetworks",
"version": "8.5.0.0"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.1"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.2"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.3"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.4"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.5"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.6"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.7"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.8"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.9"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.10"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.11"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.12"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.13"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.14"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.15"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.16"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.17"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.4.18"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.0"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.1"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.2"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.3"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.4"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.5"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.6"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.7"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.8"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.9"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.10"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.5.0.11"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.6.0.0"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.6.0.1"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.6.0.2"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.6.0.3"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.6.0.4"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.6.0.5"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.6.0.6"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.7.0.0"
},
{
"model": "instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.7.1.0"
},
{
"model": "networks aruba instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.7.x.x"
},
{
"model": "networks aruba instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.4.x.x"
},
{
"model": "networks aruba instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "6.5.x.x"
},
{
"model": "networks aruba instant",
"scope": "eq",
"trust": 0.6,
"vendor": "aruba",
"version": "8.6.x.x"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"db": "NVD",
"id": "CVE-2021-37732"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.4.4.8-4.2.4.18",
"versionStartIncluding": "6.4.0.2-4.1.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "6.5.4.19",
"versionStartIncluding": "6.5.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.5.0.12",
"versionStartIncluding": "8.5.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.6.0.7",
"versionStartIncluding": "8.6.0.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.7.1.1",
"versionStartIncluding": "8.7.0.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "8.7.1.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-37732"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Siemens reported these vulnerabilities to CISA.",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
],
"trust": 0.6
},
"cve": "CVE-2021-37732",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "CNVD",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CNVD-2021-89450",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"author": "VULMON",
"availabilityImpact": "COMPLETE",
"baseScore": 9.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 8.0,
"id": "CVE-2021-37732",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "HIGH",
"trust": 0.1,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.2,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2021-37732",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2021-89450",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "CNNVD",
"id": "CNNVD-202110-412",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2021-37732",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"db": "VULMON",
"id": "CVE-2021-37732"
},
{
"db": "NVD",
"id": "CVE-2021-37732"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "A remote arbitrary command execution vulnerability was discovered in HPE Aruba Instant (IAP) version(s): Aruba Instant 6.4.x.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x.x: 6.5.4.18 and below; Aruba Instant 8.5.x.x: 8.5.0.11 and below; Aruba Instant 8.6.x.x: 8.6.0.6 and below; Aruba Instant 8.7.x.x: 8.7.1.0 and below. Aruba has released patches for Aruba Instant (IAP) that address this security vulnerability. Provides the only Wi-Fi solution that is easy to set up. \n\r\n\r\nAruba Instant has a command injection vulnerability, which is caused by incorrect input validation in the web interface. Attackers use the vulnerability to send elaborate HTTP requests to the application and execute arbitrary OS commands on the target system",
"sources": [
{
"db": "NVD",
"id": "CVE-2021-37732"
},
{
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"db": "VULMON",
"id": "CVE-2021-37732"
}
],
"trust": 1.53
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2021-37732",
"trust": 2.3
},
{
"db": "SIEMENS",
"id": "SSA-917476",
"trust": 1.7
},
{
"db": "ICS CERT",
"id": "ICSA-21-315-06",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2021-89450",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021111004",
"trust": 0.6
},
{
"db": "CS-HELP",
"id": "SB2021100720",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2021.3874",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202110-412",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2021-37732",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"db": "VULMON",
"id": "CVE-2021-37732"
},
{
"db": "NVD",
"id": "CVE-2021-37732"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
]
},
"id": "VAR-202110-1632",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
}
],
"trust": 1.6
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
}
]
},
"last_update_date": "2023-12-18T10:57:05.198000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Patch for Aruba Instant command injection vulnerability (CNVD-2021-89450)",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/300081"
},
{
"title": "Aruba Instant Fixes for operating system command injection vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=166190"
},
{
"title": "Siemens Security Advisories: Siemens Security Advisory",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=siemens_security_advisories\u0026qid=3a4aac694122a77f4f689c8a03f6ae75"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"db": "VULMON",
"id": "CVE-2021-37732"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-78",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2021-37732"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://www.arubanetworks.com/assets/alert/aruba-psa-2021-017.txt"
},
{
"trust": 1.7,
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-917476.pdf"
},
{
"trust": 0.6,
"url": "https://nvd.nist.gov/vuln/detail/cve-2021-37732"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021111004"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2021.3874"
},
{
"trust": 0.6,
"url": "https://us-cert.cisa.gov/ics/advisories/icsa-21-315-06"
},
{
"trust": 0.6,
"url": "https://www.cybersecurity-help.cz/vdb/sb2021100720"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/78.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://www.cisa.gov/uscert/ics/advisories/icsa-21-315-06"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"db": "VULMON",
"id": "CVE-2021-37732"
},
{
"db": "NVD",
"id": "CVE-2021-37732"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"db": "VULMON",
"id": "CVE-2021-37732"
},
{
"db": "NVD",
"id": "CVE-2021-37732"
},
{
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-11-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"date": "2021-10-12T00:00:00",
"db": "VULMON",
"id": "CVE-2021-37732"
},
{
"date": "2021-10-12T16:15:07.423000",
"db": "NVD",
"id": "CVE-2021-37732"
},
{
"date": "2021-10-07T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-11-20T00:00:00",
"db": "CNVD",
"id": "CNVD-2021-89450"
},
{
"date": "2021-11-24T00:00:00",
"db": "VULMON",
"id": "CVE-2021-37732"
},
{
"date": "2021-11-24T21:37:33.660000",
"db": "NVD",
"id": "CVE-2021-37732"
},
{
"date": "2021-11-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Aruba Instant command injection vulnerability (CNVD-2021-89450)",
"sources": [
{
"db": "CNVD",
"id": "CNVD-2021-89450"
}
],
"trust": 0.6
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "operating system commend injection",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202110-412"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…