CVE-2017-9000
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
ArubaOS, all versions prior to 6.3.1.25, 6.4 prior to 6.4.4.16, 6.5.x prior to 6.5.1.9, 6.5.2, 6.5.3 prior to 6.5.3.3, 6.5.4 prior to 6.5.4.2, 8.x prior to 8.1.0.4 FIPS and non-FIPS versions of software are both affected equally is vulnerable to unauthenticated arbitrary file access. An unauthenticated user with network access to an Aruba mobility controller on TCP port 8080 or 8081 may be able to access arbitrary files stored on the mobility controller. Ports 8080 and 8081 are used for captive portal functionality and are listening, by default, on all IP interfaces of the mobility controller, including captive portal interfaces. The attacker could access files which could contain passwords, keys, and other sensitive information that could lead to full system compromise.
ArubaOS, en todas las versiones anteriores a la 6.3.1.25, versiones 6.4 anteriores a la 6.4.4.16, versiones 6.5.x anteriores a la 6.5.1.9, 6.5.2, versiones 6.5.3 anteriores a la 6.5.3.3, versiones 6.5.4 anteriores a la 6.5.4.2, versiones 8.x anteriores a la 8.1.0.4 de versiones FIPS y non-FIPS (afectadas por igual), se ha visto afectado por un acceso no autenticado a archivos arbitrarios. Un usuario no autenticado con acceso de red a un controlador de movilidad de Aruba en los puertos TCP 8080 u 8081 podría ser capaz de acceder a archivos arbitrarios almacenados en el controlador de movilidad. Los puertos 8080 y 8081 se emplean para funcionalidades de portal cautivo y escuchan, por defecto, en todas las interfaces IP del controlador de movilidad, incluyendo las interfaces de portal cautivo. El atacante podría acceder a archivos que contienen contraseñas, claves y otro tipo de información sensible que podría conducir al compromiso total del sistema.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-05-15 CVE Reserved
- 2018-08-06 CVE Published
- 2023-12-28 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://www.securitytracker.com/id/1039580 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-006.txt | 2018-10-18 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Hp Search vendor "Hp" | Arubaos Search vendor "Hp" for product "Arubaos" | < 6.3.1.25 Search vendor "Hp" for product "Arubaos" and version " < 6.3.1.25" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Arubaos Search vendor "Hp" for product "Arubaos" | >= 6.4 < 6.4.4.16 Search vendor "Hp" for product "Arubaos" and version " >= 6.4 < 6.4.4.16" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Arubaos Search vendor "Hp" for product "Arubaos" | >= 6.5.0 < 6.5.1.9 Search vendor "Hp" for product "Arubaos" and version " >= 6.5.0 < 6.5.1.9" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Arubaos Search vendor "Hp" for product "Arubaos" | >= 6.5.3 < 6.5.3.3 Search vendor "Hp" for product "Arubaos" and version " >= 6.5.3 < 6.5.3.3" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Arubaos Search vendor "Hp" for product "Arubaos" | >= 6.5.4 < 6.5.4.2 Search vendor "Hp" for product "Arubaos" and version " >= 6.5.4 < 6.5.4.2" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Arubaos Search vendor "Hp" for product "Arubaos" | >= 8.0 < 8.1.0.4 Search vendor "Hp" for product "Arubaos" and version " >= 8.0 < 8.1.0.4" | - |
Affected
| ||||||
Hp Search vendor "Hp" | Arubaos Search vendor "Hp" for product "Arubaos" | 6.5.2 Search vendor "Hp" for product "Arubaos" and version "6.5.2" | - |
Affected
|