ArubaOS Command Injection Vulnerabilities: Privileged User Execution
CVE-2024-25613

7.2HIGH

Key Information:

Vendor

HP

Vendor
CVE Published:
5 March 2024

What is CVE-2024-25613?

ArubaOS, the operating system developed by Aruba Networks, is impacted by authenticated command injection vulnerabilities within its command line interface. These flaws could allow an attacker with valid credentials to inject malicious commands, ultimately enabling the execution of arbitrary code at the privilege level of the underlying operating system. This poses significant security risks, as it may lead to unauthorized access and manipulation of sensitive system resources. Organizations using affected versions of ArubaOS are advised to review their security posture and apply necessary mitigations to protect against potential exploitation of these vulnerabilities.

Affected Version(s)

ArubaOS Wi-Fi Controllers and Campus/Remote Access Points ArubaOS 10.5.x.x: 10.5.0.1 and below

ArubaOS Wi-Fi Controllers and Campus/Remote Access Points ArubaOS 10.5.x.x: 10.5.0.1 and below

ArubaOS Wi-Fi Controllers and Campus/Remote Access Points ArubaOS 10.4.x.x: 10.4.0.3 and below

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erik De Jong (bugcrowd.com/erikdejong)
.