Lucene search

K
cveHpeCVE-2020-24633
HistoryDec 11, 2020 - 2:15 a.m.

CVE-2020-24633

2020-12-1102:15:10
CWE-120
hpe
web.nvd.nist.gov
68
1
cve-2020-24633
aruba networks
buffer overflow
remote code execution
vulnerability
papi
udp
access points
controllers
nvd

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.008

Percentile

82.2%

There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending especially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211) of access-points or controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.

Affected configurations

Nvd
Node
arubanetworksarubaosRange<6.4.4.24
OR
arubanetworksarubaosRange6.5.0.06.5.4.18
OR
arubanetworksarubaosRange8.0.0.08.2.2.10
OR
arubanetworksarubaosRange8.3.0.08.3.0.14
OR
arubanetworksarubaosRange8.4.0.08.5.0.11
OR
arubanetworksarubaosRange8.6.0.08.6.0.6
OR
arubanetworksarubaosRange8.7.0.08.7.1.0
AND
arubanetworks7005Match-
OR
arubanetworks7008Match-
OR
arubanetworks7010Match-
OR
arubanetworks7024Match-
OR
arubanetworks7030Match-
OR
arubanetworks7205Match-
OR
arubanetworks7210Match-
OR
arubanetworks7220Match-
OR
arubanetworks7240xmMatch-
OR
arubanetworks7280Match-
Node
arubanetworkssd-wanRange<2.1.0.2
OR
arubanetworkssd-wanRange2.2.0.02.2.0.1
AND
arubanetworks9004Match-
OR
arubanetworks9004-lteMatch-
OR
arubanetworks9012Match-
VendorProductVersionCPE
arubanetworksarubaos*cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
arubanetworks7005-cpe:2.3:h:arubanetworks:7005:-:*:*:*:*:*:*:*
arubanetworks7008-cpe:2.3:h:arubanetworks:7008:-:*:*:*:*:*:*:*
arubanetworks7010-cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*
arubanetworks7024-cpe:2.3:h:arubanetworks:7024:-:*:*:*:*:*:*:*
arubanetworks7030-cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*
arubanetworks7205-cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*
arubanetworks7210-cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*
arubanetworks7220-cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*
arubanetworks7240xm-cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 151

CNA Affected

[
  {
    "product": "Aruba 9000 Gateway",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "2.1.0.1"
      },
      {
        "status": "affected",
        "version": "2.2.0.0 and below"
      }
    ]
  },
  {
    "product": "Aruba 7000 Series Mobility Controllers",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "6.4.4.23"
      },
      {
        "status": "affected",
        "version": "6.5.4.17"
      },
      {
        "status": "affected",
        "version": "8.2.2.9"
      },
      {
        "status": "affected",
        "version": "8.3.0.13"
      },
      {
        "status": "affected",
        "version": "8.5.0.10"
      },
      {
        "status": "affected",
        "version": "8.6.0.5"
      },
      {
        "status": "affected",
        "version": "8.7.0.0 and below"
      }
    ]
  },
  {
    "product": "Aruba 7200 Series Mobility Controllers",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "6.4.4.23"
      },
      {
        "status": "affected",
        "version": "6.5.4.17"
      },
      {
        "status": "affected",
        "version": "8.2.2.9"
      },
      {
        "status": "affected",
        "version": "8.3.0.13"
      },
      {
        "status": "affected",
        "version": "8.5.0.10"
      },
      {
        "status": "affected",
        "version": "8.6.0.5"
      },
      {
        "status": "affected",
        "version": "8.7.0.0 and below"
      }
    ]
  }
]

Social References

More

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

10

Confidence

High

EPSS

0.008

Percentile

82.2%

Related for CVE-2020-24633