Aruba Instant Web and Siemens SCALANCE W1750D Information Exposure

high Nessus Network Monitor Plugin ID 720253

Synopsis

A CWE-200 vulnerability exists in the affected devices that allows an unauthenticated attacker to access core dumps of previously crashed processes through the web interface of the device.

Description

If a process crashes, it may leave behind a \"core dump\", which contains the memory contents of the process at the time it crashed. It was discovered that core dumps are stored in a way that unauthenticated users can access them through the Aruba Instant web interface. The same is true for Siemens SCALANCE W750D.

Solution

Perform vendor recommended mitigations and apply available vendor upgrades.

See Also

https://cert-portal.siemens.com/productcert/pdf/ssa-549547.pdf,http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-001.txt

Plugin Details

Severity: High

ID: 720253

Family: SCADA

Published: 6/4/2019

Updated: 9/30/2019

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

Patch Publication Date: 5/14/2019

Vulnerability Publication Date: 5/14/2019

Reference Information

CVE: CVE-2018-7083

BID: 108374