Impact
The vulnerability is a heap‑based buffer overflow in the Network Management Service of the Aruba AOS firmware. An unauthenticated attacker can send crafted data to the service, causing a memory corruption that allows arbitrary code execution with the privileges of the underlying operating system. The flaw also has the potential to trigger a denial‑of‑service by crashing the service. The weakness is a classic buffer overflow (CWE‑120).
Affected Systems
Affected products are Hewlett Packard Enterprise Aruba Networking Wireless Operating System (AOS) versions AOS‑8 and AOS‑10. The issue exists in the Network Management Service component of these firmware releases.
Risk and Exploitability
The CVSS base score of 7.5 indicates high severity. While the EPSS score is currently unavailable, the vulnerability permits remote code execution without authentication, and it is not listed in the CISA KEV catalog yet. The attack most likely originates from a remote source that can reach the management interface, making timely remediation critical.
OpenCVE Enrichment