// For flags

CVE-2017-9000

 

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

ArubaOS, all versions prior to 6.3.1.25, 6.4 prior to 6.4.4.16, 6.5.x prior to 6.5.1.9, 6.5.2, 6.5.3 prior to 6.5.3.3, 6.5.4 prior to 6.5.4.2, 8.x prior to 8.1.0.4 FIPS and non-FIPS versions of software are both affected equally is vulnerable to unauthenticated arbitrary file access. An unauthenticated user with network access to an Aruba mobility controller on TCP port 8080 or 8081 may be able to access arbitrary files stored on the mobility controller. Ports 8080 and 8081 are used for captive portal functionality and are listening, by default, on all IP interfaces of the mobility controller, including captive portal interfaces. The attacker could access files which could contain passwords, keys, and other sensitive information that could lead to full system compromise.

ArubaOS, en todas las versiones anteriores a la 6.3.1.25, versiones 6.4 anteriores a la 6.4.4.16, versiones 6.5.x anteriores a la 6.5.1.9, 6.5.2, versiones 6.5.3 anteriores a la 6.5.3.3, versiones 6.5.4 anteriores a la 6.5.4.2, versiones 8.x anteriores a la 8.1.0.4 de versiones FIPS y non-FIPS (afectadas por igual), se ha visto afectado por un acceso no autenticado a archivos arbitrarios. Un usuario no autenticado con acceso de red a un controlador de movilidad de Aruba en los puertos TCP 8080 u 8081 podría ser capaz de acceder a archivos arbitrarios almacenados en el controlador de movilidad. Los puertos 8080 y 8081 se emplean para funcionalidades de portal cautivo y escuchan, por defecto, en todas las interfaces IP del controlador de movilidad, incluyendo las interfaces de portal cautivo. El atacante podría acceder a archivos que contienen contraseñas, claves y otro tipo de información sensible que podría conducir al compromiso total del sistema.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-05-15 CVE Reserved
  • 2018-08-06 CVE Published
  • 2023-12-28 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Hp
Search vendor "Hp"
Arubaos
Search vendor "Hp" for product "Arubaos"
< 6.3.1.25
Search vendor "Hp" for product "Arubaos" and version " < 6.3.1.25"
-
Affected
Hp
Search vendor "Hp"
Arubaos
Search vendor "Hp" for product "Arubaos"
>= 6.4 < 6.4.4.16
Search vendor "Hp" for product "Arubaos" and version " >= 6.4 < 6.4.4.16"
-
Affected
Hp
Search vendor "Hp"
Arubaos
Search vendor "Hp" for product "Arubaos"
>= 6.5.0 < 6.5.1.9
Search vendor "Hp" for product "Arubaos" and version " >= 6.5.0 < 6.5.1.9"
-
Affected
Hp
Search vendor "Hp"
Arubaos
Search vendor "Hp" for product "Arubaos"
>= 6.5.3 < 6.5.3.3
Search vendor "Hp" for product "Arubaos" and version " >= 6.5.3 < 6.5.3.3"
-
Affected
Hp
Search vendor "Hp"
Arubaos
Search vendor "Hp" for product "Arubaos"
>= 6.5.4 < 6.5.4.2
Search vendor "Hp" for product "Arubaos" and version " >= 6.5.4 < 6.5.4.2"
-
Affected
Hp
Search vendor "Hp"
Arubaos
Search vendor "Hp" for product "Arubaos"
>= 8.0 < 8.1.0.4
Search vendor "Hp" for product "Arubaos" and version " >= 8.0 < 8.1.0.4"
-
Affected
Hp
Search vendor "Hp"
Arubaos
Search vendor "Hp" for product "Arubaos"
6.5.2
Search vendor "Hp" for product "Arubaos" and version "6.5.2"
-
Affected