Unauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol
CVE-2023-22752
What is CVE-2023-22752?
Aruba Networks access points are susceptible to stack-based buffer overflow vulnerabilities, allowing unauthenticated remote code execution. Attackers can exploit these vulnerabilities by sending specially crafted packets to the PAPI UDP port (8211). If successfully exploited, these vulnerabilities enable the execution of arbitrary code as a privileged user on the underlying operating system, potentially leading to significant security breaches.
Affected Version(s)
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 8.6.x.x: 8.6.0.19 and below
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 8.6.x.x: 8.6.0.19 and below
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 8.10.x.x: 8.10.0.4 and below
