Unauthenticated Remote Code Execution Vulnerability in PAPI CLI Service
CVE-2024-42507

9.8CRITICAL

Key Information:

Vendor
HP
Status
Vendor
CVE Published:
25 September 2024

Summary

The vulnerability arises from command injection flaws present in the Command Line Interface (CLI) service associated with Aruba's Access Point management protocol (PAPI). By exploiting these vulnerabilities, an attacker can send specially crafted packets to the UDP port 8211, leading to unauthorized remote code execution. This allows the attacker to run arbitrary code with elevated privileges on the underlying operating system. Organizations using affected Aruba Access Points should take immediate action to assess their security posture and apply any necessary updates or mitigations.

Affected Version(s)

Aruba OS Version 10.5.0.0: 10.6.0.2 and below

Aruba OS Version 10.5.0.0: 10.6.0.2 and below

Aruba OS Version 10.0.0.0: 10.4.1.13 and below

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

erikdejong
.