Unauthenticated Remote Code Execution Vulnerability in PAPI Due to Command Injection
CVE-2024-42509

9.8CRITICAL

Key Information:

Vendor
HP
Vendor
CVE Published:
5 November 2024

Badges

πŸ‘Ύ Exploit ExistsπŸ“° News Worthy

Summary

The CVE-2024-42509 vulnerability is an unauthenticated remote code execution flaw in the PAPI protocol used by Aruba Access Points from Hewlett Packard Enterprise (HPE). Exploiting this vulnerability allows attackers to execute arbitrary code as privileged users on the underlying operating system, posing a significant risk to affected devices. HPE has released security updates to address this and other critical vulnerabilities in their Access Points, urging users to enable cluster security and block access to specific UDP ports to mitigate the risk. Although these vulnerabilities have not been reported as exploited in the wild, they are attractive targets for threat actors, and there is a potential for exploitation of unpatched systems in the near future.

Affected Version(s)

HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 AOS-10.4.x.x: 10.4.1.4 and below

HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 AOS-10.4.x.x: 10.4.1.4 and below

HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 Instant AOS-8.12.x.x: 8.12.0.2 and below

News Articles

HPE Security Patches CVE-2024-42509 In Aruba Access Points

HPE releases critical patches for CVE-2024-42509, addressing remote code execution risks in Aruba Access Points.

2 months ago

HPE Issues Critical Security Patches for Aruba Access Point Vulnerabilities

HPE addresses critical flaws in Aruba Access Points, preventing remote code execution for secure networking

2 months ago

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

Credit

zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
.