Unauthenticated Remote Code Execution Vulnerability in PAPI Due to Command Injection
CVE-2024-42509
Key Information:
- Vendor
- HP
- Vendor
- CVE Published:
- 5 November 2024
Badges
Summary
The CVE-2024-42509 vulnerability is an unauthenticated remote code execution flaw in the PAPI protocol used by Aruba Access Points from Hewlett Packard Enterprise (HPE). Exploiting this vulnerability allows attackers to execute arbitrary code as privileged users on the underlying operating system, posing a significant risk to affected devices. HPE has released security updates to address this and other critical vulnerabilities in their Access Points, urging users to enable cluster security and block access to specific UDP ports to mitigate the risk. Although these vulnerabilities have not been reported as exploited in the wild, they are attractive targets for threat actors, and there is a potential for exploitation of unpatched systems in the near future.
Affected Version(s)
HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 AOS-10.4.x.x: 10.4.1.4 and below
HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 AOS-10.4.x.x: 10.4.1.4 and below
HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 Instant AOS-8.12.x.x: 8.12.0.2 and below
Get notified when SecurityVulnerability.io launches alerting π
Well keep you posted π§
News Articles
HPE Security Patches CVE-2024-42509 In Aruba Access Points
HPE releases critical patches for CVE-2024-42509, addressing remote code execution risks in Aruba Access Points.
2 months ago
HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities
HPE addresses critical flaws in Aruba Access Points, preventing remote code execution for secure networking
2 months ago
References
CVSS V3.1
Timeline
- πΎ
Exploit known to exist
- π°
First article discovered by The Hacker News
Vulnerability published
Vulnerability Reserved