5 results (0.016 seconds)

CVSS: 7.5EPSS: 0%CPEs: 8EXPL: 0

02 Nov 2009 — ArubaOS 3.3.1.x, 3.3.2.x, RN 3.1.x, 3.4.x, and 3.3.2.x-FIPS on the Aruba Mobility Controller allows remote attackers to cause a denial of service (Access Point crash) via a malformed 802.11 Association Request management frame. ArubaOS v3.3.1.x, v3.3.2.x, RN v3.1.x, v3.4.x y v3.3.2.x-FIPS en "Aruba Mobility Controller" (controlador de movilidad de Aruba) permite a atacantes remotos provocar una denegación de servicio (caída del punto de acceso) a través de "Association Request management frame" (paquetes de... • http://secunia.com/advisories/37085 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

27 Aug 2009 — The SNMP daemon in ArubaOS 3.3.2.6 in Aruba Mobility Controller does not restrict SNMP access, which allows remote attackers to (1) read all SNMP community strings via SNMP-COMMUNITY-MIB::snmpCommunityName (1.3.6.1.6.3.18.1.1.1.2) or SNMP-VIEW-BASED-ACM-MIB::vacmGroupName (1.3.6.1.6.3.16.1.2.1.3) with knowledge of one community string, and (2) read SNMPv3 user names via SNMP-USER-BASED-SM-MIB or SNMP-VIEW-BASED-ACM-MIB. Demonio en ArubaOS v3.3.2.6 en Aruba Mobility Controller no restringe el acceso SNMP, lo... • http://osvdb.org/51916 • CWE-264: Permissions, Privileges, and Access Controls •

CVSS: 10.0EPSS: 0%CPEs: 2EXPL: 0

21 Aug 2009 — Aruba Mobility Controller running ArubaOS 3.3.1.16, and possibly other versions, installs the same default X.509 certificate for all installations, which allows remote attackers to bypass authentication. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation. Aruba Mobility Controller con ArubaOS 3.3.1.16, y posiblemente otras versiones, instala por defecto el mismo certificado X.509 por defecto para todas las instalaciones, lo que p... • http://osvdb.org/51731 • CWE-310: Cryptographic Issues •

CVSS: 7.8EPSS: 1%CPEs: 18EXPL: 0

15 Dec 2008 — Aruba Mobility Controller 2.4.8.x-FIPS, 2.5.x, 3.1.x, 3.2.x, 3.3.1.x, and 3.3.2.x allows remote attackers to cause a denial of service (device crash) via a malformed Extensible Authentication Protocol (EAP) frame. Aruba Mobility Controller v2.4.8.x-FIPS, v2.5.x, v3.1.x, v3.2.x, v3.3.1.x, y v3.3.2.x permite a atacantes remotos provocar una denegación de servicio (caída del dispositivo) mediante una trama deformada del protocolo de autenticación extensible (EAP - Extensible Authentication Protocol). • http://secunia.com/advisories/33057 • CWE-399: Resource Management Errors •

CVSS: 9.0EPSS: 1%CPEs: 4EXPL: 0

16 May 2008 — Unspecified vulnerability in the TACACS authentication component in Aruba Mobility Controller 3.1.x, 3.2.x, and 3.3.x allows remote authenticated users to gain privileges via unknown vectors. Vulnerabilidad no especificada en el componente de autenticación TACACS en Aruba Mobility Controller 3.1.x, 3.2.x, and 3.3.x permite a usuarios remotos autenticados conseguir privilegios a través de vectores no especificados. • http://secunia.com/advisories/30262 •