SB2021090214 - Multiple privilege escalation vulnerabilities in ArubaOS



SB2021090214 - Multiple privilege escalation vulnerabilities in ArubaOS

Published: September 2, 2021

Security Bulletin ID SB2021090214
Severity
Low
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Local access
Highest impact Code execution

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) OS Command Injection (CVE-ID: CVE-2021-37722)

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the command line interface. A local  authenticated user can pass specially crafted data to the application and execute arbitrary OS commands on the target system with elevated privileges.



2) OS Command Injection (CVE-ID: CVE-2021-37721)

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the command line interface. A local  authenticated user can pass specially crafted data to the application and execute arbitrary OS commands on the target system with elevated privileges.



3) OS Command Injection (CVE-ID: CVE-2021-37720)

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the command line interface. A local  authenticated user can pass specially crafted data to the application and execute arbitrary OS commands on the target system with elevated privileges.



4) OS Command Injection (CVE-ID: CVE-2020-37719)

The vulnerability allows a local user to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in the command line interface. A local  authenticated user can pass specially crafted data to the application and execute arbitrary OS commands on the target system with elevated privileges.



Remediation

Install update from vendor's website.