Логотип exploitDog
bind:CVE-2024-33512
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-33512

Количество 3

Количество 3

nvd логотип

CVE-2024-33512

почти 2 года назад

There is a buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Средний
github логотип

GHSA-57gw-c6xj-3hcc

почти 2 года назад

There is a buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Средний
fstec логотип

BDU:2024-04024

почти 2 года назад

Уязвимость службы Local User Authentication Database операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-33512

There is a buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
23%
Средний
почти 2 года назад
github логотип
GHSA-57gw-c6xj-3hcc

There is a buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
23%
Средний
почти 2 года назад
fstec логотип
BDU:2024-04024

Уязвимость службы Local User Authentication Database операционных систем ArubaOS, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
23%
Средний
почти 2 года назад

Уязвимостей на страницу