Unauthenticated Remote Code Execution Vulnerability in PAPI
CVE-2024-47460
Summary
A command injection vulnerability has been identified in the CLI service associated with Aruba's Access Point management protocol, specifically affecting communications through the PAPI UDP port (8211). An attacker can exploit this vulnerability by sending specially crafted packets, leading to the potential execution of arbitrary code with elevated privileges on the underlying operating system. This vulnerability raises significant security concerns as it allows unauthorized access and control over affected Aruba Access Points, making it imperative for organizations to assess their systems and apply necessary security measures.
Affected Version(s)
HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 AOS-10.4.x.x: 10.4.1.4 and below
HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 AOS-10.4.x.x: 10.4.1.4 and below
HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 Instant AOS-8.12.x.x: 8.12.0.2 and below
Get notified when SecurityVulnerability.io launches alerting π
Well keep you posted π§
News Articles
References
CVSS V3.1
Timeline
- π°
First article discovered by The Hacker News
Vulnerability published
Vulnerability Reserved