Page 4 of 21 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

Unspecified vulnerability in administrative interfaces in ArubaOS 6.3.1.11, 6.3.1.11-FIPS, 6.4.2.1, and 6.4.2.1-FIPS on Aruba controllers allows remote attackers to bypass authentication, and obtain potentially sensitive information or add guest accounts, via an SSH session. Vulnerabilidad no especificada en la interfaces de administración en ArubaOS 6.3.1.11, 6.3.1.11-FIPS, 6.4.2.1, y 6.4.2.1-FIPS en los controladores Aruba permite a atacantes remotos evadir la autenticación, y obtener información potencialmente sensible o añadir cuentas de huéspedes, a través de una sesión SSH. Multiple vulnerabilities were identified in Aruba AP, IAP and AMP devices. The vulnerabilities were discovered during a black box security assessment and therefore the vulnerability list should not be considered exhaustive. Several of the high severity vulnerabilities listed in this report are related to the Aruba proprietary PAPI protocol and allow remote compromise of affected devices. • http://www.arubanetworks.com/support/alerts/aid-10072014.txt •

CVSS: 4.3EPSS: 0%CPEs: 11EXPL: 0

Cross-site scripting (XSS) vulnerability in the dashboard of the ArubaOS Administration WebUI in Aruba Networks ArubaOS 6.2.x before 6.2.0.3, 6.1.3.x before 6.1.3.7, 6.1.x-FIPS before 6.1.4.3-FIPS, and 6.1.x-AirGroup before 6.1.3.6-AirGroup, as used by Mobility Controller, allows remote wireless access points to inject arbitrary web script or HTML via a crafted SSID. Ejecución de comandos en sitios cruzados (XSS) en el tablero de la WebUI ArubaOS Administración en Aruba Networks ArubaOS v6.2.x antes de v6.2.0.3, v6.1.3.x antes de v6.1.3.7, v6.1.x-FIPS antes de 6.1.4.3-FIPS, y 6.1.x-Airgroup antes v6.1.3.6-Airgroup, utilizada por el Mobility Controller, que permite a los puntos de acceso inalámbricos remotos inyectar secuencias de comandos web o HTML a través de un SSID diseñado. • http://osvdb.org/91485 http://secunia.com/advisories/52690 http://www.arubanetworks.com/support/alerts/aid-042213.asc http://www.securityfocus.com/bid/58579 https://exchange.xforce.ibmcloud.com/vulnerabilities/82917 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 8EXPL: 0

ArubaOS 3.3.1.x, 3.3.2.x, RN 3.1.x, 3.4.x, and 3.3.2.x-FIPS on the Aruba Mobility Controller allows remote attackers to cause a denial of service (Access Point crash) via a malformed 802.11 Association Request management frame. ArubaOS v3.3.1.x, v3.3.2.x, RN v3.1.x, v3.4.x y v3.3.2.x-FIPS en "Aruba Mobility Controller" (controlador de movilidad de Aruba) permite a atacantes remotos provocar una denegación de servicio (caída del punto de acceso) a través de "Association Request management frame" (paquetes de gestión de peticiones de asociación) 802.11 malformados. • http://secunia.com/advisories/37085 http://www.arubanetworks.com/support/alerts/aid-102609.asc http://www.securityfocus.com/bid/36832 http://www.vupen.com/english/advisories/2009/3051 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

The SNMP daemon in ArubaOS 3.3.2.6 in Aruba Mobility Controller does not restrict SNMP access, which allows remote attackers to (1) read all SNMP community strings via SNMP-COMMUNITY-MIB::snmpCommunityName (1.3.6.1.6.3.18.1.1.1.2) or SNMP-VIEW-BASED-ACM-MIB::vacmGroupName (1.3.6.1.6.3.16.1.2.1.3) with knowledge of one community string, and (2) read SNMPv3 user names via SNMP-USER-BASED-SM-MIB or SNMP-VIEW-BASED-ACM-MIB. Demonio en ArubaOS v3.3.2.6 en Aruba Mobility Controller no restringe el acceso SNMP, lo que permite a los atacantes remotos (1) leer todas las cadenas de caracteres SNMP de la comunidad a través SNMP-COMMUNITY-MIB::snmpCommunityName (v1.3.6.1.6.3.18.1.1.1.2) o SNMP-VIEW-BASED-ACM-MIB::vacmGroupName (v1.3.6.1.6.3.16.1.2.1.3) con conocimiento de una cadena de caracteres de la comunidad, y (2) leer SNMPv3 nombres de usuario a través SNMP-USER-BASED-SM-MIB or SNMP-VIEW-BASED-ACM-MIB. • http://osvdb.org/51916 http://www.securityfocus.com/archive/1/498033/100/0/threaded http://www.securityfocus.com/bid/32102 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

Aruba Mobility Controller running ArubaOS 3.3.1.16, and possibly other versions, installs the same default X.509 certificate for all installations, which allows remote attackers to bypass authentication. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation. Aruba Mobility Controller con ArubaOS 3.3.1.16, y posiblemente otras versiones, instala por defecto el mismo certificado X.509 por defecto para todas las instalaciones, lo que permite a atacantes remotos eludir la autenticación. NOTA: esto es sólo una vulnerabilidad cuando el administrador no sigue las recomendaciones de la documentación de seguridad del producto. • http://osvdb.org/51731 http://www.securityfocus.com/archive/1/496604/100/0/threaded http://www.securityfocus.com/archive/1/496622/100/0/threaded http://www.securityfocus.com/bid/31336 • CWE-310: Cryptographic Issues •