Vulnerability Description
An administrative application user of or application user with write access to Aruba Airwave VisualRF is able to obtain code execution on the AMP platform. This is possible due to the ability to overwrite a file on disk which is subsequently deserialized by the Java application component.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arubanetworks | Airwave | >= 8.0.0, < 8.2.10.1 |
Related Weaknesses (CWE)
References
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-002.txtVendor Advisory
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-002.txtVendor Advisory
FAQ
What is CVE-2019-5326?
CVE-2019-5326 is a vulnerability with a CVSS score of 7.2 (HIGH). An administrative application user of or application user with write access to Aruba Airwave VisualRF is able to obtain code execution on the AMP platform. This is possible due to the ability to overw...
How severe is CVE-2019-5326?
CVE-2019-5326 has been rated HIGH with a CVSS base score of 7.2/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-5326?
Check the references section above for vendor advisories and patch information. Affected products include: Arubanetworks Airwave.