Логотип exploitDog
bind:CVE-2024-26304
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-26304

Количество 3

Количество 3

nvd логотип

CVE-2024-26304

почти 2 года назад

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Высокий
github логотип

GHSA-w7hg-wrfg-cf9f

почти 2 года назад

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Высокий
fstec логотип

BDU:2024-03431

почти 2 года назад

Уязвимость службы управления L2/L3 операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Высокий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-26304

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
73%
Высокий
почти 2 года назад
github логотип
GHSA-w7hg-wrfg-cf9f

There is a buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
73%
Высокий
почти 2 года назад
fstec логотип
BDU:2024-03431

Уязвимость службы управления L2/L3 операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
73%
Высокий
почти 2 года назад

Уязвимостей на страницу