Vulnerability Description
A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.16 and below; Aruba Instant 8.3.x: 8.3.0.12 and below; Aruba Instant 8.5.x: 8.5.0.6 and below; Aruba Instant 8.6.x: 8.6.0.2 and below. Aruba has released patches for Aruba Instant that address this security vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arubanetworks | Instant | >= 6.4.0.0, <= 6.4.4.8-4.2.4.17 |
| Siemens | Scalance W1750D Firmware | < 8.7.0 |
| Siemens | Scalance W1750D | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdfPatchThird Party Advisory
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txtVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-723417.pdfPatchThird Party Advisory
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txtVendor Advisory
FAQ
What is CVE-2019-5319?
CVE-2019-5319 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A remote buffer overflow vulnerability was discovered in some Aruba Instant Access Point (IAP) products in version(s): Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below; Aruba Instant 6.5.x: 6.5.4.16 an...
How severe is CVE-2019-5319?
CVE-2019-5319 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-5319?
Check the references section above for vendor advisories and patch information. Affected products include: Arubanetworks Instant, Siemens Scalance W1750D Firmware, Siemens Scalance W1750D.