Vulnerability Description
A remote buffer overflow vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.7.1.2, 8.6.0.8, 8.5.0.12, 8.3.0.15. Aruba has released patches for Aruba SD-WAN Software and Gateways and ArubaOS that address this security vulnerability.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Arubanetworks | Sd-Wan | >= 2.2.0.0, < 2.2.0.4 |
| Arubanetworks | Arubaos | >= 8.3.0.0, < 8.3.0.15 |
| Siemens | Scalance W1750D Firmware | < 8.7.1.3 |
| Siemens | Scalance W1750D | - |
Related Weaknesses (CWE)
References
- https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdfPatchVendor Advisory
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txtVendor Advisory
- https://cert-portal.siemens.com/productcert/pdf/ssa-280624.pdfPatchVendor Advisory
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txtVendor Advisory
FAQ
What is CVE-2021-37716?
CVE-2021-37716 is a vulnerability with a CVSS score of 9.8 (CRITICAL). A remote buffer overflow vulnerability was discovered in Aruba SD-WAN Software and Gateways; Aruba Operating System Software version(s): Prior to 8.6.0.4-2.2.0.4; Prior to 8.7.1.2, 8.6.0.8, 8.5.0.12, ...
How severe is CVE-2021-37716?
CVE-2021-37716 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2021-37716?
Check the references section above for vendor advisories and patch information. Affected products include: Arubanetworks Sd-Wan, Arubanetworks Arubaos, Siemens Scalance W1750D Firmware, Siemens Scalance W1750D.