Lucene search

K
cveHpeCVE-2020-24634
HistoryDec 11, 2020 - 2:15 a.m.

CVE-2020-24634

2020-12-1102:15:11
CWE-77
hpe
web.nvd.nist.gov
59
1
cve-2020-24634
aruba networks
access points
controllers
remote code injection
papi
udp
security vulnerability

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.003

Percentile

68.5%

An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.

Affected configurations

Nvd
Node
arubanetworksarubaosRange<8.2.2.10
OR
arubanetworksarubaosRange8.3.0.08.3.0.14
OR
arubanetworksarubaosRange8.4.0.08.5.0.11
OR
arubanetworksarubaosRange8.6.0.08.6.0.6
OR
arubanetworksarubaosRange8.7.0.08.7.1.0
AND
arubanetworks7005Match-
OR
arubanetworks7008Match-
OR
arubanetworks7010Match-
OR
arubanetworks7024Match-
OR
arubanetworks7030Match-
OR
arubanetworks7205Match-
OR
arubanetworks7210Match-
OR
arubanetworks7220Match-
OR
arubanetworks7240xmMatch-
OR
arubanetworks7280Match-
Node
arubanetworkssd-wanRange<2.1.0.2
OR
arubanetworkssd-wanRange2.2.0.02.2.0.1
AND
arubanetworks9004Match-
OR
arubanetworks9004-lteMatch-
OR
arubanetworks9012Match-
VendorProductVersionCPE
arubanetworksarubaos*cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
arubanetworks7005-cpe:2.3:h:arubanetworks:7005:-:*:*:*:*:*:*:*
arubanetworks7008-cpe:2.3:h:arubanetworks:7008:-:*:*:*:*:*:*:*
arubanetworks7010-cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*
arubanetworks7024-cpe:2.3:h:arubanetworks:7024:-:*:*:*:*:*:*:*
arubanetworks7030-cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*
arubanetworks7205-cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*
arubanetworks7210-cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*
arubanetworks7220-cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*
arubanetworks7240xm-cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 151

CNA Affected

[
  {
    "product": "Aruba 9000 Gateway",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "2.1.0.1"
      },
      {
        "status": "affected",
        "version": "2.2.0.0 and below"
      }
    ]
  },
  {
    "product": "Aruba 7000 Series Mobility Controllers",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "6.4.4.23"
      },
      {
        "status": "affected",
        "version": "6.5.4.17"
      },
      {
        "status": "affected",
        "version": "8.2.2.9"
      },
      {
        "status": "affected",
        "version": "8.3.0.13"
      },
      {
        "status": "affected",
        "version": "8.5.0.10"
      },
      {
        "status": "affected",
        "version": "8.6.0.5"
      },
      {
        "status": "affected",
        "version": "8.7.0.0 and below"
      }
    ]
  },
  {
    "product": "Aruba 7200 Series Mobility Controllers",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "6.4.4.23"
      },
      {
        "status": "affected",
        "version": "6.5.4.17"
      },
      {
        "status": "affected",
        "version": "8.2.2.9"
      },
      {
        "status": "affected",
        "version": "8.3.0.13"
      },
      {
        "status": "affected",
        "version": "8.5.0.10"
      },
      {
        "status": "affected",
        "version": "8.6.0.5"
      },
      {
        "status": "affected",
        "version": "8.7.0.0 and below"
      }
    ]
  }
]

Social References

More

CVSS2

10

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.4

Confidence

High

EPSS

0.003

Percentile

68.5%

Related for CVE-2020-24634