ID CVE-2021-25141
Summary A security vulnerability has been identified in in certain HPE and Aruba L2/L3 switch firmware. A data processing error due to improper handling of an unexpected data type in user supplied information to the switch's management interface has been identified. The data processing error could be exploited to cause a crash or reboot in the switch management interface and/or possibly the switch itself leading to local denial of service (DoS). The user must have administrator privileges to exploit this vulnerability.
References
Vulnerable Configurations
  • cpe:2.3:o:arubanetworks:aruba_5406r_zl2_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_5406r_zl2_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_5406r_zl2:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_5406r_zl2:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_5412r_zl2_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_5412r_zl2_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_5412r_zl2:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_5412r_zl2:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_3810m_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_3810m_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_3810m:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_3810m:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_2930m_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_2930m_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_2930m:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_2930m:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_2930f_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_2930f_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_2930f:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_2930f:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_2920_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_2920_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_2920:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_2920:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_2540_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_2540_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_2540:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_2540:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_2530ya_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_2530ya_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_2530ya:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_2530ya:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_3800_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_3800_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_3800:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_3800:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_2620_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_2620_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_2620:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_2620:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hpe:8200_zl_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hpe:8200_zl_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hpe:8200_zl:-:*:*:*:*:*:*:*
    cpe:2.3:h:hpe:8200_zl:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hpe:6200_yl_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hpe:6200_yl_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hpe:6200_yl:-:*:*:*:*:*:*:*
    cpe:2.3:h:hpe:6200_yl:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hpe:3500_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hpe:3500_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hpe:3500:-:*:*:*:*:*:*:*
    cpe:2.3:h:hpe:3500:-:*:*:*:*:*:*:*
  • cpe:2.3:o:hpe:3500_yl_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:hpe:3500_yl_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:hpe:3500_yl:-:*:*:*:*:*:*:*
    cpe:2.3:h:hpe:3500_yl:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:aruba_2530yb_firmware:*:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:aruba_2530yb_firmware:*:*:*:*:*:*:*:*
  • cpe:2.3:h:arubanetworks:aruba_2530yb:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_2530yb:-:*:*:*:*:*:*:*
CVSS
Base: 4.9 (as of 16-02-2021 - 15:22)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
LOCAL LOW NONE
Impact
ConfidentialityIntegrityAvailability
NONE NONE COMPLETE
cvss-vector via4 AV:L/AC:L/Au:N/C:N/I:N/A:C
Last major update 16-02-2021 - 15:22
Published 09-02-2021 - 17:15
Last modified 16-02-2021 - 15:22
Back to Top