Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
CVE-2019-5322
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
A remotely exploitable information disclosure vulnerability is present in Aruba Intelligent Edge Switch models 5400, 3810, 2920, 2930, 2530 with GigT port, 2530 10/100 port, or 2540. The vulnerability impacts firmware 16.08.* before 16.08.0009, 16.09.* before 16.09.0007 and 16.10.* before 16.10.0003. The vulnerability allows an attacker to retrieve sensitive system information. This attack can be carried out without user authentication under very specific conditions..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 5/10
- Exploit Score
- 10/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- None
- Impact Score
- 2.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- None
CVSSv3.1 Score
- Severity
- High
- Base Score
- 7.5/10
- Exploit Score
- 3.9/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- None
- Impact Score
- 3.6/10
- Confidentiality Impact
- High
- Availability Impact
- None
- Integrity Impact
- None
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:arubanetworks:5400r_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.08.0 | 16.08.0009 | |
cpe:2.3:o:arubanetworks:5400r_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.09.0 | 16.09.0007 | |
cpe:2.3:o:arubanetworks:5400r_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.10.0 | 16.10.0003 | |
cpe:2.3:h:arubanetworks:5400r:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:arubanetworks:3810_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.08.0 | 16.08.0009 | |
cpe:2.3:o:arubanetworks:3810_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.09.0 | 16.09.0007 | |
cpe:2.3:o:arubanetworks:3810_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.10.0 | 16.10.0003 | |
cpe:2.3:h:arubanetworks:3810:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:arubanetworks:2920_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.08.0 | 16.08.0009 | |
cpe:2.3:o:arubanetworks:2920_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.09.0 | 16.09.0007 | |
cpe:2.3:o:arubanetworks:2920_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.10.0 | 16.10.0003 | |
cpe:2.3:h:arubanetworks:2920:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:arubanetworks:2930_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.08.0 | 16.08.0009 | |
cpe:2.3:o:arubanetworks:2930_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.09.0 | 16.09.0007 | |
cpe:2.3:o:arubanetworks:2930_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.10.0 | 16.10.0003 | |
cpe:2.3:h:arubanetworks:2930:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:arubanetworks:2530_with_gigt_port_firmware:*:*:*:* |
Yes
|
16.08.0 | 16.08.0009 | |
cpe:2.3:o:arubanetworks:2530_with_gigt_port_firmware:*:*:*:* |
Yes
|
16.09.0 | 16.09.0007 | |
cpe:2.3:o:arubanetworks:2530_with_gigt_port_firmware:*:*:*:* |
Yes
|
16.10.0 | 16.10.0003 | |
cpe:2.3:h:arubanetworks:2530_with_gigt_port:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:arubanetworks:2530_10\/100_port_firmware:*:*:*:*:* |
Yes
|
16.08.0 | 16.08.0009 | |
cpe:2.3:o:arubanetworks:2530_10\/100_port_firmware:*:*:*:*:* |
Yes
|
16.09.0 | 16.09.0007 | |
cpe:2.3:o:arubanetworks:2530_10\/100_port_firmware:*:*:*:*:* |
Yes
|
16.10.0 | 16.10.0003 | |
cpe:2.3:h:arubanetworks:2530_10\/100_port:-:*:*:*:*:*:*:* |
No
|
- | ||
cpe:2.3:o:arubanetworks:2540_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.08.0 | 16.08.0009 | |
cpe:2.3:o:arubanetworks:2540_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.09.0 | 16.09.0007 | |
cpe:2.3:o:arubanetworks:2540_firmware:*:*:*:*:*:*:*:* |
Yes
|
16.10.0 | 16.10.0003 | |
cpe:2.3:h:arubanetworks:2540:-:*:*:*:*:*:*:* |
No
|
- |