Unauthenticated Remote Code Execution Vulnerability in PAPI CLI Service
CVE-2024-42507
9.8CRITICAL
Summary
The vulnerability arises from command injection flaws present in the Command Line Interface (CLI) service associated with Aruba's Access Point management protocol (PAPI). By exploiting these vulnerabilities, an attacker can send specially crafted packets to the UDP port 8211, leading to unauthorized remote code execution. This allows the attacker to run arbitrary code with elevated privileges on the underlying operating system. Organizations using affected Aruba Access Points should take immediate action to assess their security posture and apply any necessary updates or mitigations.
Affected Version(s)
Aruba OS Version 10.5.0.0: 10.6.0.2 and below
Aruba OS Version 10.5.0.0: 10.6.0.2 and below
Aruba OS Version 10.0.0.0: 10.4.1.13 and below
References
CVSS V3.1
Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Credit
erikdejong