Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2015-1388

Опубликовано: 24 мар. 2015
Источник: nvd
CVSS2: 7.2
EPSS Низкий

Описание

The "RAP console" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
Версия до 6.2.3.9 (включая)
cpe:2.3:o:arubanetworks:arubaos:6.1.3.0:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.1:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.2:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.3:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.4:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.5:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.6:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.7:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.8:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.1.3.9:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.2.3.1:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.2.3.2:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.2.3.3:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.2.3.4:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.2.3.5:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.2.3.6:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.2.3.7:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.2.3.8:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.0.0:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.1:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.2:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.3:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.4:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.5:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.6:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.7:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.8:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.9:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.10:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.11:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.12:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.13:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.3.1.14:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.4.2.3:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.4.2.4:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:6.4.2.5:*:*:*:*:*:*:*

EPSS

Процентиль: 48%
0.00249
Низкий

7.2 High

CVSS2

Дефекты

CWE-78

Связанные уязвимости

github
больше 3 лет назад

The "RAP console" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors.

EPSS

Процентиль: 48%
0.00249
Низкий

7.2 High

CVSS2

Дефекты

CWE-78