Description
There is a buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

Published: 2024-05-01
Score: 9.8 Critical
EPSS: 9.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

No history.

Subscriptions

Arubanetworks Arubaos Sd-wan
cve-icon MITRE

Status: PUBLISHED

Assigner: hpe

Published:

Updated: 2024-08-02T00:07:19.370Z

Reserved: 2024-02-16T19:42:43.187Z

Link: CVE-2024-26305

cve-icon Vulnrichment

Updated: 2024-05-02T13:31:19.365Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-05-01T15:15:14.863

Modified: 2024-11-21T09:02:20.113

Link: CVE-2024-26305

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses