All the vulnerabilites related to Hewlett Packard Enterprise (HPE) - Aruba OS
cve-2024-42502
Vulnerability from cvelistv5
Published
2024-09-17 17:14
Modified
2024-09-18 14:38
Severity ?
EPSS score ?
Summary
Authenticated Remote Command Execution (RCE) Vulnerability in the AOS Command Line Interface
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba OS |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "arubaos", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "10.6.0.2", "status": "affected", "version": "10.6.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0.13", "status": "affected", "version": "8.10.0.0", "versionType": "semver" }, { "lessThanOrEqual": "10.6.0.0", "status": "affected", "version": "10.5.0.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4.0.0", "status": "affected", "version": "10.3.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0.0", "status": "affected", "version": "8.11.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0.1", "status": "affected", "version": "8.12.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.9.0.0", "status": "affected", "version": "6.5.4.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42502", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T14:30:56.922591Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T14:38:16.739Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba OS", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=10.6.0.2", "status": "affected", "version": "Version 10.6.0.0: 10.6.0.2 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.10.0.13", "status": "affected", "version": "Version 8.10.0.0: 8.10.0.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.6.0.0", "status": "affected", "version": "Version 10.5.0.0: 10.6.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.4.0.0", "status": "affected", "version": "Version 10.3.0.0: 10.4.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.0", "status": "affected", "version": "Version 8.11.0.0: 8.12.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.1", "status": "affected", "version": "Version 8.12.0.0: 8.12.0.1 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.9.0.0", "status": "affected", "version": "Version 6.5.4.0: 8.9.0.0 and below", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "erikdejong" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAuthenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability result in the ability to inject shell commands on the underlying operating system.\u003c/p\u003e" } ], "value": "Authenticated command injection vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability result in the ability to inject shell commands on the underlying operating system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T17:14:54.458Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04709en_us\u0026docLocale=en_US" } ], "source": { "advisory": "HPESBNW04709", "discovery": "EXTERNAL" }, "title": "Authenticated Remote Command Execution (RCE) Vulnerability in the AOS Command Line Interface", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-42502", "datePublished": "2024-09-17T17:14:54.458Z", "dateReserved": "2024-08-02T17:04:57.631Z", "dateUpdated": "2024-09-18T14:38:16.739Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42501
Vulnerability from cvelistv5
Published
2024-09-17 17:13
Modified
2024-09-18 14:58
Severity ?
EPSS score ?
Summary
Authenticated Path Traversal Vulnerability Leads to a Remote Command Execution (RCE)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba OS |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "arubaos", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "10.6.0.2", "status": "affected", "version": "10.6.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0.13", "status": "affected", "version": "8.10.0.0", "versionType": "semver" }, { "lessThanOrEqual": "10.6.0.0", "status": "affected", "version": "10.5.0.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4.0.0", "status": "affected", "version": "10.3.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0.0", "status": "affected", "version": "8.11.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0.1", "status": "affected", "version": "8.12.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.9.0.0", "status": "affected", "version": "6.5.4.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42501", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T14:41:26.544944Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T14:58:56.294Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba OS", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=10.6.0.2", "status": "affected", "version": "Version 10.6.0.0: 10.6.0.2 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.10.0.13", "status": "affected", "version": "Version 8.10.0.0: 8.10.0.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.6.0.0", "status": "affected", "version": "Version 10.5.0.0: 10.6.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.4.0.0", "status": "affected", "version": "Version 10.3.0.0: 10.4.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.0", "status": "affected", "version": "Version 8.11.0.0: 8.12.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.1", "status": "affected", "version": "Version 8.12.0.0: 8.12.0.1 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.9.0.0", "status": "affected", "version": "Version 6.5.4.0: 8.9.0.0 and below", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "erikdejong" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAn authenticated Path Traversal vulnerabilities exists in the ArubaOS. Successful exploitation of this vulnerability allows an attacker to install unsigned packages on the underlying operating system, enabling the threat actor to execute arbitrary code or install implants. \u003c/p\u003e" } ], "value": "An authenticated Path Traversal vulnerabilities exists in the ArubaOS. Successful exploitation of this vulnerability allows an attacker to install unsigned packages on the underlying operating system, enabling the threat actor to execute arbitrary code or install implants." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T17:13:34.722Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04709en_us\u0026docLocale=en_US" } ], "source": { "advisory": "HPESBNW04709", "discovery": "EXTERNAL" }, "title": "Authenticated Path Traversal Vulnerability Leads to a Remote Command Execution (RCE)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-42501", "datePublished": "2024-09-17T17:13:34.722Z", "dateReserved": "2024-08-02T17:04:57.631Z", "dateUpdated": "2024-09-18T14:58:56.294Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42507
Vulnerability from cvelistv5
Published
2024-09-24 18:11
Modified
2024-09-26 03:55
Severity ?
EPSS score ?
Summary
Unauthenticated Command Injection Vulnerabilities in the CLI Service Accessed by the PAPI Protocol
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba OS |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "arubaos", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "10.6.0.2", "status": "affected", "version": "10.5.0.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4.1.13", "status": "affected", "version": "10.0.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0.13", "status": "affected", "version": "6.4.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0.1", "status": "affected", "version": "8.11.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42507", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T03:55:51.695Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba OS", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=10.6.0.2", "status": "affected", "version": "Version 10.5.0.0: 10.6.0.2 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.4.1.13", "status": "affected", "version": "Version 10.0.0.0: 10.4.1.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.10.0.13", "status": "affected", "version": "Version 6.4.0.0: 8.10.0.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.1", "status": "affected", "version": "Version 8.11.0.0: 8.12.0.1 and below", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "erikdejong" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCommand injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba\u0027s Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.\u003c/p\u003e" } ], "value": "Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba\u0027s Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:11:37.946Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04712en_us\u0026docLocale=en_US" } ], "source": { "advisory": "HPESBNW04712", "discovery": "EXTERNAL" }, "title": "Unauthenticated Command Injection Vulnerabilities in the CLI Service Accessed by the PAPI Protocol", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-42507", "datePublished": "2024-09-24T18:11:37.946Z", "dateReserved": "2024-08-02T17:04:57.632Z", "dateUpdated": "2024-09-26T03:55:51.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42506
Vulnerability from cvelistv5
Published
2024-09-24 18:10
Modified
2024-09-26 03:55
Severity ?
EPSS score ?
Summary
Unauthenticated Command Injection Vulnerabilities in the CLI Service Accessed by the PAPI Protocol
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba OS |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "arubaos", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "10.6.0.2", "status": "affected", "version": "10.5.0.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4.1.13", "status": "affected", "version": "10.0.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0.13", "status": "affected", "version": "6.4.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0.1", "status": "affected", "version": "8.11.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42506", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T03:55:50.783Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba OS", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=10.6.0.2", "status": "affected", "version": "Version 10.5.0.0: 10.6.0.2 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.4.1.13", "status": "affected", "version": "Version 10.0.0.0: 10.4.1.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.10.0.13", "status": "affected", "version": "Version 6.4.0.0: 8.10.0.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.1", "status": "affected", "version": "Version 8.11.0.0: 8.12.0.1 and below", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "erikdejong" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCommand injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba\u0027s Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.\u003c/p\u003e" } ], "value": "Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba\u0027s Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:10:30.812Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04712en_us\u0026docLocale=en_US" } ], "source": { "advisory": "HPESBNW04712", "discovery": "EXTERNAL" }, "title": "Unauthenticated Command Injection Vulnerabilities in the CLI Service Accessed by the PAPI Protocol", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-42506", "datePublished": "2024-09-24T18:10:30.812Z", "dateReserved": "2024-08-02T17:04:57.632Z", "dateUpdated": "2024-09-26T03:55:50.783Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42505
Vulnerability from cvelistv5
Published
2024-09-24 18:09
Modified
2024-09-26 03:55
Severity ?
EPSS score ?
Summary
Unauthenticated Command Injection Vulnerabilities in the CLI Service Accessed by the PAPI Protocol
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba OS |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "arubaos", "vendor": "arubanetworks", "versions": [ { "lessThanOrEqual": "10.6.0.2", "status": "affected", "version": "10.5.0.0", "versionType": "semver" }, { "lessThanOrEqual": "10.4.1.13", "status": "affected", "version": "10.0.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.10.0.13", "status": "affected", "version": "6.4.0.0", "versionType": "semver" }, { "lessThanOrEqual": "8.12.0.1", "status": "affected", "version": "8.11.0.0", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42505", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-77", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-26T03:55:49.884Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba OS", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=10.6.0.2", "status": "affected", "version": "Version 10.5.0.0: 10.6.0.2 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.4.1.13", "status": "affected", "version": "Version 10.0.0.0: 10.4.1.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.10.0.13", "status": "affected", "version": "Version 6.4.0.0: 8.10.0.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.1", "status": "affected", "version": "Version 8.11.0.0: 8.12.0.1 and below", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "erikdejong" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eCommand injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba\u0027s Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.\u003c/p\u003e" } ], "value": "Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba\u0027s Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-24T18:09:27.417Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04712en_us\u0026docLocale=en_US" } ], "source": { "advisory": "HPESBNW04712", "discovery": "EXTERNAL" }, "title": "Unauthenticated Command Injection Vulnerabilities in the CLI Service Accessed by the PAPI Protocol", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-42505", "datePublished": "2024-09-24T18:09:27.417Z", "dateReserved": "2024-08-02T17:04:57.632Z", "dateUpdated": "2024-09-26T03:55:49.884Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-42503
Vulnerability from cvelistv5
Published
2024-09-17 17:16
Modified
2024-09-18 14:35
Severity ?
EPSS score ?
Summary
Authenticated Remote Command Execution (RCE) Vulnerability in the Lua Package Within the AOS Command Line Interface (CLI)
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Hewlett Packard Enterprise (HPE) | Aruba OS |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:arubaos:10.6.0.0:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:arubaos:6.5.4.0:*:*:*:*:*:*:*", "cpe:2.3:o:arubanetworks:arubaos:8.6.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "arubaos", "vendor": "arubanetworks", "versions": [ { "lessThan": "10.4.0.0", "status": "affected", "version": "10.3.0.0", "versionType": "custom" }, { "lessThan": "10.6.0.0", "status": "affected", "version": "10.5.0.0", "versionType": "custom" }, { "lessThanOrEqual": "10.6.0.2", "status": "affected", "version": "10.6.0.0", "versionType": "custom" }, { "lessThan": "6.5.5.0", "status": "affected", "version": "6.5.4.0", "versionType": "custom" }, { "lessThanOrEqual": "8.10.0.13", "status": "affected", "version": "8.6.0.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-42503", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-09-18T14:15:44.854583Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-18T14:35:00.233Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "Aruba OS", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=10.6.0.2", "status": "affected", "version": "Version 10.6.0.0: 10.6.0.2 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.10.0.13", "status": "affected", "version": "Version 8.10.0.0: 8.10.0.13 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.6.0.0", "status": "affected", "version": "Version 10.5.0.0: 10.6.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=10.4.0.0", "status": "affected", "version": "Version 10.3.0.0: 10.4.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.0", "status": "affected", "version": "Version 8.11.0.0: 8.12.0.0 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.12.0.1", "status": "affected", "version": "Version 8.12.0.0: 8.12.0.1 and below", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=8.9.0.0", "status": "affected", "version": "Version 6.5.4.0: 8.9.0.0 and below", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "erikdejong" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eAuthenticated command execution vulnerability exist in the ArubaOS command line interface (CLI). Successful exploitation of this vulnerabilities result in the ability to run arbitrary commands as a priviledge user on the underlying operating system.\u003c/p\u003e" } ], "value": "Authenticated command execution vulnerability exist in the ArubaOS command line interface (CLI). Successful exploitation of this vulnerabilities result in the ability to run arbitrary commands as a priviledge user on the underlying operating system." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T17:16:10.361Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04709en_us\u0026docLocale=en_US" } ], "source": { "advisory": "HPESBNW04709", "discovery": "EXTERNAL" }, "title": "Authenticated Remote Command Execution (RCE) Vulnerability in the Lua Package Within the AOS Command Line Interface (CLI)", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2024-42503", "datePublished": "2024-09-17T17:16:10.361Z", "dateReserved": "2024-08-02T17:04:57.631Z", "dateUpdated": "2024-09-18T14:35:00.233Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }