{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-14T17:58:22.525","vulnerabilities":[{"cve":{"id":"CVE-2018-7084","sourceIdentifier":"security-alert@hpe.com","published":"2019-05-10T18:29:03.133","lastModified":"2024-11-21T04:11:37.480","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A command injection vulnerability is present that permits an unauthenticated user with access to the Aruba Instant web interface to execute arbitrary system commands within the underlying operating system. An attacker could use this ability to copy files, read configuration, write files, delete files, or reboot the device. Workaround: Block access to the Aruba Instant web interface from all untrusted users. Resolution: Fixed in Aruba Instant 4.2.4.12, 6.5.4.11, 8.3.0.6, and 8.4.0.1"},{"lang":"es","value":"Existe una vulnerabilidad de inyección de comandos que permite a un usuario no autenticado con acceso a la interfaz web de Aruba Instant ejecutar comandos arbitrarios del sistema dentro del sistema operativo subyacente. Un atacante podría utilizar esta capacidad para copiar archivos, leer la configuración, escribir archivos, eliminar archivos o reiniciar el dispositivo. Para evitarlo: Bloquee el acceso a la interfaz web de Aruba Instant de todos los usuarios no confiables. Resolución: Solucionado en Aruba Instant, versiones 4.2.4.12, 6.5.4.11, 8.3.0.6 y 8.4.0.1"}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1\/AV:N\/AC:L\/PR:N\/UI:N\/S:U\/C:H\/I:H\/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N\/AC:L\/Au:N\/C:C\/I:C\/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*","versionStartIncluding":"4.0","versionEndExcluding":"4.2.4.12","matchCriteriaId":"EC1A7F0E-2967-4FFD-AF10-993F73B29C79"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.0","versionEndExcluding":"6.5.4.11","matchCriteriaId":"C4A8C11A-80E4-4927-8794-92AED47956E7"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*","versionStartIncluding":"8.3.0","versionEndExcluding":"8.3.0.6","matchCriteriaId":"3571ED0E-9E35-4B7D-80FD-DDD1FC187995"},{"vulnerable":true,"criteria":"cpe:2.3:a:arubanetworks:aruba_instant:*:*:*:*:*:*:*:*","versionStartIncluding":"8.4.0","versionEndExcluding":"8.4.0.1","matchCriteriaId":"E269D3DC-0DA7-4FC6-8591-E4B324F9F482"}]}]},{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*","versionEndExcluding":"8.4.0.1","matchCriteriaId":"C4AB6855-E124-4F3C-9993-647B4AB1ACBF"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*","matchCriteriaId":"FBC30055-239F-4BB1-B2D1-E5E35F0D8911"}]}]}],"references":[{"url":"http:\/\/www.securityfocus.com\/bid\/108374","source":"security-alert@hpe.com","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-549547.pdf","source":"security-alert@hpe.com","tags":["Third Party Advisory"]},{"url":"https:\/\/www.arubanetworks.com\/assets\/alert\/ARUBA-PSA-2019-001.txt","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"http:\/\/www.securityfocus.com\/bid\/108374","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https:\/\/cert-portal.siemens.com\/productcert\/pdf\/ssa-549547.pdf","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https:\/\/www.arubanetworks.com\/assets\/alert\/ARUBA-PSA-2019-001.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}