Page 5 of 84 results (0.005 seconds)

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

28 Feb 2023 — There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

28 Feb 2023 — There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

28 Feb 2023 — There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 10.0EPSS: 0%CPEs: 4EXPL: 0

28 Feb 2023 — There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 0

03 Nov 2022 — Due to improper restrictions on XML entities multiple vulnerabilities exist in the command line interface of ArubaOS. A successful exploit could allow an authenticated attacker to retrieve files from the local system or cause the application to consume system resources, resulting in a denial of service condition. Debido a restricciones inadecuadas sobre entidades XML, existen múltiples vulnerabilidades en la interfaz de línea de comandos de ArubaOS. Una explotación exitosa podría permitir a un atacante aute... • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt • CWE-611: Improper Restriction of XML External Entity Reference •

CVSS: 6.8EPSS: 0%CPEs: 5EXPL: 0

03 Nov 2022 — A buffer overflow vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in a denial of service on the affected system. Existe una vulnerabilidad de desbordamiento de búfer en la interfaz de línea de comandos de ArubaOS. La explotación exitosa de esta vulnerabilidad resulta en una Denegación de Servicio (DoS) en el sistema afectado. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 5.3EPSS: 0%CPEs: 5EXPL: 0

03 Nov 2022 — Aruba has identified certain configurations of ArubaOS that can lead to sensitive information disclosure from the configured ESSIDs. The scenarios in which disclosure of potentially sensitive information can occur are complex, and depend on factors beyond the control of attackers. Aruba ha identificado ciertas configuraciones de ArubaOS que pueden dar lugar a la divulgación de información confidencial de los ESSID configurados. Los escenarios en los que puede ocurrir la divulgación de información potencialm... • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt •

CVSS: 6.8EPSS: 0%CPEs: 15EXPL: 0

03 Nov 2022 — An authenticated attacker can impact the integrity of the ArubaOS bootloader on 7xxx series controllers. Successful exploitation can compromise the hardware chain of trust on the impacted controller. Un atacante autenticado puede afectar la integridad del gestor de arranque de ArubaOS en los controladores de la serie 7xxx. Una explotación exitosa puede comprometer la cadena de confianza del hardware en el controlador afectado. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

03 Nov 2022 — A vulnerability exists in the ArubaOS bootloader on 7xxx series controllers which can result in a denial of service (DoS) condition on an impacted system. A successful attacker can cause a system hang which can only be resolved via a power cycle of the impacted controller. Existe una vulnerabilidad en bootloader de ArubaOS en los controladores de la serie 7xxx que puede provocar una condición de Denegación de Servicio (DoS) en un sistema afectado. Un atacante exitoso puede causar un bloqueo del sistema que ... • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt •

CVSS: 8.5EPSS: 0%CPEs: 5EXPL: 0

03 Nov 2022 — An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of the vulnerability results in the ability to delete arbitrary files on the underlying operating system. Existe una vulnerabilidad de path traversal autenticada en la interfaz de línea de comandos de ArubaOS. La explotación exitosa de la vulnerabilidad da como resultado la capacidad de eliminar archivos arbitrarios en el sistema operativo subyacente. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •