Unauthenticated Buffer Overflow Vulnerabilities in Services Accessed by the PAPI Protocol
CVE-2023-35982
Summary
Aruba Networks has identified buffer overflow vulnerabilities within multiple underlying services that may be exploited by attackers. By sending crafted packets to the UDP port (8211) used by the PAPI (Aruba's access point management protocol), unauthenticated users could potentially execute arbitrary code as a privileged user on the operating system. It is crucial for organizations using affected products to assess their risk exposure and implement mitigations to safeguard their network infrastructure.
Affected Version(s)
Aruba Access Points running InstantOS and ArubaOS 10 ArubaOS 10.4.x.x: 10.4.0.1 and below
Aruba Access Points running InstantOS and ArubaOS 10 ArubaOS 10.4.x.x: 10.4.0.1 and below
Aruba Access Points running InstantOS and ArubaOS 10 InstantOS 8.11.x.x: 8.11.1.0 and below
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved