Impact
The vulnerability is a stack‑based buffer overflow in command‑line interface services of the HPE Aruba AOS operating system. An authenticated attacker with administrative privileges can craft specially formatted requests to trigger the overflow, allowing the execution of arbitrary code on the underlying operating system. This results in Remote Code Execution, giving the attacker elevated privileges. The weakness is a classic stack‑based buffer overflow, identified as CWE‑119.
Affected Systems
Affected products include HPE Aruba Networking Wireless Operating System (AOS). The issue is present in the AOS-8 and AOS-10 operating system releases. No specific version numbers are provided in the data, so all AOS-8 and AOS-10 deployments should be assessed for this vulnerability.
Risk and Exploitability
The CVSS score of 7.2 indicates a high severity. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access to the AOS command‑line interface with administrative privileges, implying that only users who can log in as an administrator may attempt the attack. The lack of public exploitation data suggests that exploitation may currently be limited to in‑house or targeted attacks, but the high severity and privileged nature of the attack vector warrant prompt action.
OpenCVE Enrichment