Unauthenticated DoS Vulnerability in ArubaOS PAPI Protocol
CVE-2024-33516

7.5HIGH

What is CVE-2024-33516?

A Denial of Service vulnerability has been identified in the Auth service of ArubaOS, specifically when accessed through the PAPI protocol. This issue allows an attacker to disrupt the normal operation of the affected controllers without requiring authentication, potentially leading to service outages and affecting network reliability. Users of ArubaOS are advised to apply the necessary mitigations to safeguard their systems against such unauthorized interruptions.

Affected Version(s)

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 10.5.x.x: 10.5.1.0 and below

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 10.5.x.x: 10.5.1.0 and below

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS 10.4.x.x: 10.4.1.0 and below

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Chancen
.