Логотип exploitDog
bind:CVE-2023-22749
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-22749

Количество 3

Количество 3

nvd логотип

CVE-2023-22749

почти 3 года назад

There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-jgx5-4p88-qc4w

почти 3 года назад

There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2023-01518

почти 3 года назад

Уязвимость реализации сетевого протокола PAPI операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2023-22749

There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
1%
Низкий
почти 3 года назад
github логотип
GHSA-jgx5-4p88-qc4w

There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
1%
Низкий
почти 3 года назад
fstec логотип
BDU:2023-01518

Уязвимость реализации сетевого протокола PAPI операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
почти 3 года назад

Уязвимостей на страницу