Unauthenticated Remote Code Execution Vulnerability in PAPI
CVE-2024-31473
9.8CRITICAL
What is CVE-2024-31473?
A command injection vulnerability exists in the deauthentication service of Aruba Access Points, where an attacker can potentially exploit this flaw to execute arbitrary code on the underlying operating system. By sending specially crafted packets to the PAPI (Aruba's Access Point management protocol) UDP port 8211, it is possible to achieve unauthenticated remote code execution, posing significant risks to network integrity and security.
Affected Version(s)
AOS-8 Instant and AOS-10 AP 10.5.0.0 <= 10.5.1.0
AOS-8 Instant and AOS-10 AP 10.4.0.0 <= 10.4.1.0
AOS-8 Instant and AOS-10 AP 8.11.0.0 <= 8.11.2.1
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Erik De Jong (bugcrowd.com/erikdejong
