Buffer Overflow Vulnerabilities in PAPI Could Lead to Remote Code Execution
CVE-2024-31466
Summary
A set of buffer overflow vulnerabilities exist within the command-line interface (CLI) service of Aruba's Access Point Management Protocol (PAPI). These vulnerabilities can be exploited by sending specially crafted packets to the UDP port 8211, which is used by PAPI. If exploited successfully, an attacker can execute arbitrary code on the underlying operating system with the privileges of a privileged user. The implications of this vulnerability are significant, as it allows unauthorized access and control over affected systems, highlighting the critical need for users to apply security updates promptly.
Affected Version(s)
Aruba InstantOS and Aruba Access Points running ArubaOS 10 InstantOS or ArubaOS (access points) 10.5.x.x: 10.5.1.0 and below.
Aruba InstantOS and Aruba Access Points running ArubaOS 10 InstantOS or ArubaOS (access points) 10.5.x.x: 10.5.1.0 and below.
Aruba InstantOS and Aruba Access Points running ArubaOS 10 InstantOS or ArubaOS (access points) 10.4.x.x: 10.4.1.0 and below.
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved