There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Arubanetworks
Subscribe
|
Ap-103
Subscribe
Ap-114
Subscribe
Ap-115
Subscribe
Ap-120
Subscribe
Ap-121
Subscribe
Ap-130
Subscribe
Ap-135
Subscribe
Ap-204
Subscribe
Ap-205
Subscribe
Ap-207
Subscribe
Ap-214
Subscribe
Ap-215
Subscribe
Ap-224
Subscribe
Ap-225
Subscribe
Ap-303
Subscribe
Ap-304
Subscribe
Ap-305
Subscribe
Ap-314
Subscribe
Ap-315
Subscribe
Ap-318
Subscribe
Ap-324
Subscribe
Ap-325
Subscribe
Ap-334
Subscribe
Ap-340
Subscribe
Ap-370
Subscribe
Ap-504
Subscribe
Ap-505
Subscribe
Ap-514
Subscribe
Ap-515
Subscribe
Ap-534
Subscribe
Ap-535
Subscribe
Ap-555
Subscribe
Ap-635
Subscribe
Ap-655
Subscribe
Arubaos
Subscribe
Iap-103
Subscribe
Iap-114
Subscribe
Iap-115
Subscribe
Iap-204
Subscribe
Iap-205
Subscribe
Iap-207
Subscribe
Iap-224
Subscribe
Iap-225
Subscribe
Iap-304
Subscribe
Iap-305
Subscribe
Iap-314
Subscribe
Iap-315
Subscribe
Iap-318
Subscribe
Iap-324
Subscribe
Iap-325
Subscribe
Iap-334
Subscribe
Instant
Subscribe
Rap-108
Subscribe
Rap-109
Subscribe
|
|
Siemens
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-40495 | There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2024-08-03T10:37:42.050Z
Reserved: 2022-08-08T00:00:00
Link: CVE-2022-37888
No data.
Status : Modified
Published: 2022-10-06T18:16:05.287
Modified: 2024-11-21T07:15:18.897
Link: CVE-2022-37888
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD