Description

There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

Published: 2023-02-28
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-26867 There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
History

Fri, 07 Mar 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Arubanetworks Arubaos Sd-wan
cve-icon MITRE

Status: PUBLISHED

Assigner: hpe

Published:

Updated: 2025-03-07T20:48:40.497Z

Reserved: 2023-01-06T15:24:20.502Z

Link: CVE-2023-22749

cve-icon Vulnrichment

Updated: 2024-08-02T10:20:30.413Z

cve-icon NVD

Status : Modified

Published: 2023-03-01T08:15:12.560

Modified: 2025-03-07T21:15:13.610

Link: CVE-2023-22749

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses