Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-39653 | Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 24 Sep 2024 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arubanetworks
Arubanetworks arubaos |
|
| Weaknesses | CWE-77 | |
| CPEs | cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Arubanetworks
Arubanetworks arubaos |
|
| Metrics |
ssvc
|
Tue, 24 Sep 2024 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system. | |
| Title | Unauthenticated Command Injection Vulnerabilities in the CLI Service Accessed by the PAPI Protocol | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2024-09-26T03:55:49.884Z
Reserved: 2024-08-02T17:04:57.632Z
Link: CVE-2024-42505
Updated: 2024-09-24T18:30:49.335Z
Status : Awaiting Analysis
Published: 2024-09-25T01:15:42.273
Modified: 2024-09-26T13:32:02.803
Link: CVE-2024-42505
No data.
OpenCVE Enrichment
No data.
EUVD