CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial
An unauthenticated Denial of Service (DoS) vulnerability exists in the Auth service accessed via the PAPI protocol provided by ArubaOS. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the controller.
[
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.10.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.10.0.0",
"lessThan": "8.10.0.10",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "10.5.0.0",
"lessThan": "10.5.1.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "10.4.0.0",
"lessThan": "10.4.1.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.11.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.11.0.0",
"lessThan": "8.11.2.1",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "10.3.0.0",
"lessThan": "10.4.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.9.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.9.0.0",
"lessThan": "8.10.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.8.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.8.0.0",
"lessThan": "8.9.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.7.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.7.0.0",
"lessThan": "8.8.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.6.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.6.0.0",
"lessThan": "8.7.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:6.5.4.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "6.5.4.0",
"lessThan": "6.5.5.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:a:arubanetworks:sd-wan:8.7.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "sd-wan",
"versions": [
{
"status": "affected",
"version": "8.7.0.0",
"lessThan": "*",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:a:arubanetworks:sd-wan:8.6.0.4:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "sd-wan",
"versions": [
{
"status": "affected",
"version": "8.6.0.4",
"lessThan": "*",
"versionType": "custom"
}
],
"defaultStatus": "affected"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
High
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial