CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
34.2%
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Vendor | Product | Version | CPE |
---|---|---|---|
arubanetworks | arubaos | * | cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* |
arubanetworks | mc-va-10 | - | cpe:2.3:a:arubanetworks:mc-va-10:-:*:*:*:*:*:*:* |
arubanetworks | mc-va-1k | - | cpe:2.3:a:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:* |
arubanetworks | mc-va-250 | - | cpe:2.3:a:arubanetworks:mc-va-250:-:*:*:*:*:*:*:* |
arubanetworks | mc-va-50 | - | cpe:2.3:a:arubanetworks:mc-va-50:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-10k | - | cpe:2.3:a:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-1k | - | cpe:2.3:a:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-50 | - | cpe:2.3:a:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-500 | - | cpe:2.3:a:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-5k | - | cpe:2.3:a:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:* |
[
{
"defaultStatus": "affected",
"product": "Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"status": "affected",
"version": "- ArubaOS 10.4.x.x: 10.4.0.1 and below"
},
{
"status": "affected",
"version": "- ArubaOS 8.11.x.x: 8.11.1.0 and below"
},
{
"status": "affected",
"version": "- ArubaOS 8.10.x.x: 8.10.0.6 and below"
},
{
"status": "affected",
"version": "- ArubaOS 8.6.x.x: 8.6.0.20 and below"
}
]
}
]