PRIOn Logo

Search KB


Search our pre-analyzed vulnerability database

Total Results: 439

of 22

Published:   Updated:

Vulnerability Type: Denial of service

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

An authenticated Denial-of-Service (DoS) vulnerability exists in the CLI service. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.2

An authenticated vulnerability has been identified allowing an attacker to effectively establish highly privileged persistent arbitrary code execution across boot cycles.

Published:   Updated:

Vulnerability Type: Command injection

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.2

Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.

Published:   Updated:

Vulnerability Type: Denial of service

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

An unauthenticated Denial-of-Service (DoS) vulnerability exists in the soft ap daemon accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Wi-Fi Uplink service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the BLE daemon service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.5

Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.

Published:   Updated:

Vulnerability Type: Arbitrary file deletion

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.2

There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.

Published:   Updated:

Vulnerability Type: Arbitrary file deletion

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.2

There are arbitrary file deletion vulnerabilities in the AirWave client service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.

Published:   Updated:

Vulnerability Type: Arbitrary file deletion

Vendor(s):  Arubanetworks, Hp
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.2

There are arbitrary file deletion vulnerabilities in the CLI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of these vulnerabilities result in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Arubanetworks, Hp
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

There is a buffer overflow vulnerability in the underlying AirWave client service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Arubanetworks, Hp
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

Published:   Updated:

Vulnerability Type: Buffer overflow

Vendor(s):  Arubanetworks, Hp
Significant
Remediate Within one Month
CVSS v2N/ACVSS v39.8

There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

Published:   Updated:

Vulnerability Type: Authentication flaw

Vendor(s):  Arubanetworks
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.3

A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as a non-privileged user on the underlying operating system leading to partial system compromise.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Arubanetworks
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v35.8

A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an unauthenticated remote attacker to send notifications to computers that are running ClearPass OnGuard. These notifications can then be used to phish users or trick them into downloading malicious software.

Published:   Updated:

Vulnerability Type: Authorization

Vendor(s):  Arubanetworks
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

Vulnerabilities in the web-based management interface of ClearPass Policy Manager allow an attacker with read-only privileges to perform actions that change the state of the ClearPass Policy Manager instance. Successful exploitation of these vulnerabilities allow an attacker to complete state-changing actions in the web-based management interface that should not be allowed by their current level of authorization on the platform.

Published:   Updated:

Vulnerability Type: Sql injection

Vendor(s):  Arubanetworks
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v38.8

A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster.

Published:   Updated:

Vulnerability Type: Security feature bypass

Vendor(s):  Arubanetworks
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v37.8

A vulnerability in the ClearPass OnGuard Linux agent could allow malicious users on a Linux instance to elevate their user privileges to those of a higher role. A successful exploit allows malicious users to execute arbitrary code with root level privileges on the Linux instance.

Published:   Updated:

Vulnerability Type: Design/Logic Flaw

Vendor(s):  Arubanetworks
Routine
Remediate Within 6 Months
CVSS v2N/ACVSS v36.5

A vulnerability exists which allows an authenticated attacker to access sensitive information on the AirWave Management Platform web-based management interface. Successful exploitation allows the attacker to gain access to some data that could be further exploited to laterally access devices managed and monitored by the AirWave server.

of 22