Unauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol
CVE-2023-22752
What is CVE-2023-22752?
Aruba Networks access points are susceptible to stack-based buffer overflow vulnerabilities, allowing unauthenticated remote code execution. Attackers can exploit these vulnerabilities by sending specially crafted packets to the PAPI UDP port (8211). If successfully exploited, these vulnerabilities enable the execution of arbitrary code as a privileged user on the underlying operating system, potentially leading to significant security breaches.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 8.6.x.x: 8.6.0.19 and below
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 8.6.x.x: 8.6.0.19 and below
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 8.10.x.x: 8.10.0.4 and below
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved
