Логотип exploitDog
bind:CVE-2024-42505
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-42505

Количество 3

Количество 3

nvd логотип

CVE-2024-42505

больше 1 года назад

Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-gxh2-x2v6-99jr

больше 1 года назад

Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
EPSS: Низкий
fstec логотип

BDU:2025-06273

больше 1 года назад

Уязвимость интерфейса CLI микропрограммного обеспечения точек доступа HPE Aruba Networking Access Points, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-42505

Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
github логотип
GHSA-gxh2-x2v6-99jr

Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

CVSS3: 9.8
1%
Низкий
больше 1 года назад
fstec логотип
BDU:2025-06273

Уязвимость интерфейса CLI микропрограммного обеспечения точек доступа HPE Aruba Networking Access Points, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
1%
Низкий
больше 1 года назад

Уязвимостей на страницу