ssa-723417
Vulnerability from csaf_siemens
Published
2021-05-11 00:00
Modified
2021-10-12 00:00
Summary
SSA-723417: Multiple Vulnerabilities in SCALANCE W1750D
Notes
Summary
The Scalance W1750D device contains multiple vulnerabilities that could allow an attacker to inject commands or trigger buffer overflows.
Siemens has released updates for the affected products and recommends to update to the latest versions.
General Recommendations
As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens' operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.
Additional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity
Additional Resources
For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories
Terms of Use
Siemens Security Advisories are subject to the terms and conditions contained in Siemens' underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter "License Terms"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens' Global Website (https://www.siemens.com/terms_of_use, hereinafter "Terms of Use"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.
{
"document": {
"category": "Siemens Security Advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited.",
"tlp": {
"label": "WHITE"
}
},
"notes": [
{
"category": "summary",
"text": "The Scalance W1750D device contains multiple vulnerabilities that could allow an attacker to inject commands or trigger buffer overflows.\n\nSiemens has released updates for the affected products and recommends to update to the latest versions.",
"title": "Summary"
},
{
"category": "general",
"text": "As a general security measure, Siemens strongly recommends to protect network access to devices with appropriate mechanisms. In order to operate the devices in a protected IT environment, Siemens recommends to configure the environment according to Siemens\u0027 operational guidelines for Industrial Security (Download: https://www.siemens.com/cert/operational-guidelines-industrial-security), and to follow the recommendations in the product manuals.\n\nAdditional information on Industrial Security by Siemens can be found at: https://www.siemens.com/industrialsecurity",
"title": "General Recommendations"
},
{
"category": "general",
"text": "For further inquiries on security vulnerabilities in Siemens products and solutions, please contact the Siemens ProductCERT: https://www.siemens.com/cert/advisories",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "Siemens Security Advisories are subject to the terms and conditions contained in Siemens\u0027 underlying license terms or other applicable agreements previously agreed to with Siemens (hereinafter \"License Terms\"). To the extent applicable to information, software or documentation made available in or through a Siemens Security Advisory, the Terms of Use of Siemens\u0027 Global Website (https://www.siemens.com/terms_of_use, hereinafter \"Terms of Use\"), in particular Sections 8-10 of the Terms of Use, shall apply additionally. In case of conflicts, the License Terms shall prevail over the Terms of Use.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "productcert@siemens.com",
"name": "Siemens ProductCERT",
"namespace": "https://www.siemens.com"
},
"references": [
{
"category": "self",
"summary": "SSA-723417: Multiple Vulnerabilities in SCALANCE W1750D - PDF Version",
"url": "https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdf"
},
{
"category": "self",
"summary": "SSA-723417: Multiple Vulnerabilities in SCALANCE W1750D - TXT Version",
"url": "https://cert-portal.siemens.com/productcert/txt/ssa-723417.txt"
},
{
"category": "self",
"summary": "SSA-723417: Multiple Vulnerabilities in SCALANCE W1750D - CSAF Version",
"url": "https://cert-portal.siemens.com/productcert/csaf/ssa-723417.json"
}
],
"title": "SSA-723417: Multiple Vulnerabilities in SCALANCE W1750D",
"tracking": {
"current_release_date": "2021-10-12T00:00:00Z",
"generator": {
"engine": {
"name": "Siemens ProductCERT CSAF Generator",
"version": "1"
}
},
"id": "SSA-723417",
"initial_release_date": "2021-05-11T00:00:00Z",
"revision_history": [
{
"date": "2021-05-11T00:00:00Z",
"legacy_version": "1.0",
"number": "1",
"summary": "Publication Date"
},
{
"date": "2021-08-10T00:00:00Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Added CVE-2021-34617 and CVE-2021-34618 from updated Aruba Advisory"
},
{
"date": "2021-10-12T00:00:00Z",
"legacy_version": "1.2",
"number": "3",
"summary": "Added solution for SCALANCE W1750D"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c V8.7.0",
"product": {
"name": "SCALANCE W1750D",
"product_id": "1"
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e= V8.7.0 and \u003c V8.7.1.3",
"product": {
"name": "SCALANCE W1750D",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "SCALANCE W1750D"
}
],
"category": "vendor",
"name": "Siemens"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-5317",
"cwe": {
"id": "CWE-287",
"name": "Improper Authentication"
},
"notes": [
{
"category": "summary",
"text": "A local authentication bypass vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-5317 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2019-5317 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-5317.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-5317"
},
{
"cve": "CVE-2019-5319",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2019-5319 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2019-5319 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2019-5319.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2019-5319"
},
{
"cve": "CVE-2020-24635",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2020-24635 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2020-24635 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2020-24635 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-24635.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2020-24635"
},
{
"cve": "CVE-2020-24636",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2020-24636 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2020-24636 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2020-24636 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2020-24636.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2020-24636"
},
{
"cve": "CVE-2021-25143",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A remote Denial of Service (DoS) vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25143 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25143 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25143.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25143"
},
{
"cve": "CVE-2021-25144",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25144 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25144 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25144.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25144"
},
{
"cve": "CVE-2021-25145",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A remote unauthorized disclosure of information vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25145 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25145 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25145 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25145.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25145"
},
{
"cve": "CVE-2021-25146",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25146 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25146 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25146 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25146.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25146"
},
{
"cve": "CVE-2021-25148",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25148 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25148 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25148.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25148"
},
{
"cve": "CVE-2021-25149",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25149 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25149 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25149.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25149"
},
{
"cve": "CVE-2021-25150",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1"
]
},
"references": [
{
"summary": "CVE-2021-25150 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25150 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25150.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1"
]
}
],
"title": "CVE-2021-25150"
},
{
"cve": "CVE-2021-25155",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25155 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25155 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25155 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25155.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25155"
},
{
"cve": "CVE-2021-25156",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A remote arbitrary directory create vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25156 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25156 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25156 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25156.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25156"
},
{
"cve": "CVE-2021-25157",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25157 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25157 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25157 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25157.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25157"
},
{
"cve": "CVE-2021-25158",
"cwe": {
"id": "CWE-362",
"name": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote arbitrary file read vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25158 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25158 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25158 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25158.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25158"
},
{
"cve": "CVE-2021-25159",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25159 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25159 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25159 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25159.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25159"
},
{
"cve": "CVE-2021-25160",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "summary",
"text": "A remote arbitrary file modification vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25160 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25160 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25160 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25160.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25160"
},
{
"cve": "CVE-2021-25161",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote cross-site scripting (xss) vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25161 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25161 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25161 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25161.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25161"
},
{
"cve": "CVE-2021-25162",
"cwe": {
"id": "CWE-77",
"name": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)"
},
"notes": [
{
"category": "summary",
"text": "A remote execution of arbitrary commands vulnerability was discovered in some Aruba Instant Access Point (IAP).",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-25162 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-25162 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-25162 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-25162.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-25162"
},
{
"cve": "CVE-2021-34617",
"cwe": {
"id": "CWE-80",
"name": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"
},
"notes": [
{
"category": "summary",
"text": "A vulnerability in the captive portal of Aruba Instant could allow an unauthenticated remote attacker to conduct a reflected cross-site scripting (XSS) attack against another user of the portal. A successful exploit could allow an attacker to execute arbitrary script code in a victim\u2019s browser in the context of the affected interface.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-34617 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-34617 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-34617 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-34617.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-34617"
},
{
"cve": "CVE-2021-34618",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "summary",
"text": "An unauthenticated Denial of Service vulnerability exists in affected Aruba Instant access points. Exploitation of this vulnerability is only possible via direct ethernet connection to the access point. This vulnerability can be exploited through the LLDP protocol and successful exploitation results in the unavailability of the affected access point due to resource exhaustion.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"1",
"2"
]
},
"references": [
{
"summary": "CVE-2021-34618 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"summary": "CVE-2021-34618 - SCALANCE W1750D",
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"summary": "CVE-2021-34618 Mitre 5.0 json",
"url": "https://cert-portal.siemens.com/productcert/mitre/CVE-2021-34618.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "Update to V8.7.0 or later version",
"product_ids": [
"1"
],
"url": "https://support.industry.siemens.com/cs/ww/en/view/109782770"
},
{
"category": "vendor_fix",
"details": "Update to V8.7.1.3 or later version",
"product_ids": [
"2"
],
"url": "https://support.industry.siemens.com/cs/de/en/view/109802805/"
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant device IP address on port UDP/8211 from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Command Line Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
},
{
"category": "mitigation",
"details": "Block access to the Aruba Instant Web Management Interface from all untrusted users",
"product_ids": [
"1",
"2"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"1",
"2"
]
}
],
"title": "CVE-2021-34618"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…