ArubaOS Command Injection Vulnerabilities: Privileged User Execution
CVE-2024-25612

7.2HIGH

Key Information:

Vendor

HP

Vendor
CVE Published:
5 March 2024

What is CVE-2024-25612?

Authenticated command injection vulnerabilities exist in the command line interface of ArubaOS, enabling attackers to execute arbitrary commands as a privileged user on the underlying operating system. Exploitation of this vulnerability can lead to unauthorized access and control over affected systems, posing significant threats to network security and integrity. Organizations utilizing affected versions of ArubaOS must prioritize patching to close these security gaps and protect their network infrastructure.

Affected Version(s)

ArubaOS Wi-Fi Controllers and Campus/Remote Access Points ArubaOS 10.5.x.x: 10.5.0.1 and below

ArubaOS Wi-Fi Controllers and Campus/Remote Access Points ArubaOS 10.5.x.x: 10.5.0.1 and below

ArubaOS Wi-Fi Controllers and Campus/Remote Access Points ArubaOS 10.4.x.x: 10.4.0.3 and below

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erik De Jong (bugcrowd.com/erikdejong)
.