// For flags

CVE-2016-2031

Aruba Authentication Bypass / Insecure Transport / Tons Of Issues

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple vulnerabilities exists in Aruba Instate before 4.1.3.0 and 4.2.3.1 due to insufficient validation of user-supplied input and insufficient checking of parameters, which could allow a malicious user to bypass security restrictions, obtain sensitive information, perform unauthorized actions and execute arbitrary code.

Se presentan múltiples vulnerabilidades en Aruba Instate versiones anteriores a 4.1.3.0 y 4.2.3.1, debido a una comprobación insuficiente de la entrada suministrada por el usuario y una comprobación insuficiente de los parámetros, lo que podría permitir a un usuario malicioso omitir las restricciones de seguridad, obtener información confidencial, llevar a cabo acciones no autorizadas y ejecutar código arbitrario.

Multiple vulnerabilities were identified in Aruba AP, IAP and AMP devices. The vulnerabilities were discovered during a black box security assessment and therefore the vulnerability list should not be considered exhaustive. Several of the high severity vulnerabilities listed in this report are related to the Aruba proprietary PAPI protocol and allow remote compromise of affected devices.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-01-22 CVE Reserved
  • 2016-05-06 CVE Published
  • 2023-11-20 EPSS Updated
  • 2024-08-05 CVE Updated
  • 2024-08-05 First Exploit
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Scalance W1750d Firmware
Search vendor "Siemens" for product "Scalance W1750d Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Scalance W1750d
Search vendor "Siemens" for product "Scalance W1750d"
--
Safe
Arubanetworks
Search vendor "Arubanetworks"
Airwave
Search vendor "Arubanetworks" for product "Airwave"
>= < 8.2.0.0
Search vendor "Arubanetworks" for product "Airwave" and version " >= < 8.2.0.0"
-
Affected
Arubanetworks
Search vendor "Arubanetworks"
Aruba Instant
Search vendor "Arubanetworks" for product "Aruba Instant"
< 4.1.3.0
Search vendor "Arubanetworks" for product "Aruba Instant" and version " < 4.1.3.0"
-
Affected
Arubanetworks
Search vendor "Arubanetworks"
Aruba Instant
Search vendor "Arubanetworks" for product "Aruba Instant"
4.2.3.1
Search vendor "Arubanetworks" for product "Aruba Instant" and version "4.2.3.1"
-
Affected
Arubanetworks
Search vendor "Arubanetworks"
Arubaos
Search vendor "Arubanetworks" for product "Arubaos"
*-
Affected