Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2020-AVI-838
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Aruba ArubaOS. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| N/A | N/A | ArubaOS versions 8.6.0.x antérieures à 8.6.0.6 | ||
| N/A | N/A | ArubaOS versions 6.4.4.x antérieures à 6.4.4.24 | ||
| N/A | N/A | ArubaOS versions 8.3.0.x antérieures à 8.3.0.14 | ||
| N/A | N/A | ArubaOS versions 8.2.2.x antérieures à 8.2.2.10 | ||
| N/A | N/A | ArubaOS versions 6.5.5.x antérieures à 6.5.4.18 | ||
| N/A | N/A | ArubaOS versions 8.7.x antérieures à 8.7.1.0 | ||
| N/A | N/A | ArubaOS versions 8.5.0.x antérieures à 8.5.0.11 | ||
| N/A | N/A | SD-WAN versions 2.2.x antérieures à 2.2.0.1 | ||
| N/A | N/A | SD-WAN versions 2.1.0.x antérieures à 2.1.0.2 |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "ArubaOS versions 8.6.0.x ant\u00e9rieures \u00e0 8.6.0.6",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ArubaOS versions 6.4.4.x ant\u00e9rieures \u00e0 6.4.4.24",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ArubaOS versions 8.3.0.x ant\u00e9rieures \u00e0 8.3.0.14",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ArubaOS versions 8.2.2.x ant\u00e9rieures \u00e0 8.2.2.10",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ArubaOS versions 6.5.5.x ant\u00e9rieures \u00e0 6.5.4.18",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ArubaOS versions 8.7.x ant\u00e9rieures \u00e0 8.7.1.0",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ArubaOS versions 8.5.0.x ant\u00e9rieures \u00e0 8.5.0.11",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "SD-WAN versions 2.2.x ant\u00e9rieures \u00e0 2.2.0.1",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "SD-WAN versions 2.1.0.x ant\u00e9rieures \u00e0 2.1.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-24633",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24633"
},
{
"name": "CVE-2020-24634",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24634"
},
{
"name": "CVE-2020-24637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24637"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-838",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-12-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Aruba ArubaOS.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Aruba ArubaOS",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2020-012 du 08 d\u00e9cembre 2020",
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2020-012.txt"
}
]
}
CVE-2020-10713 (GCVE-0-2020-10713)
Vulnerability from cvelistv5 – Published: 2020-07-30 12:58 – Updated: 2024-08-04 11:14
VLAI?
EPSS
Summary
A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Severity ?
No CVSS data available.
CWE
- Out-of-bounds Write leading to Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
| URL | Tags | ||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:14:14.235Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-4735",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2020/dsa-4735"
},
{
"name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2020/07/29/3"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825243"
},
{
"name": "VU#174059",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "https://www.kb.cert.org/vuls/id/174059"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20200731-0008/"
},
{
"name": "USN-4432-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4432-1/"
},
{
"name": "20200804 GRUB2 Arbitrary Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY"
},
{
"name": "openSUSE-SU-2020:1169",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html"
},
{
"name": "openSUSE-SU-2020:1168",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://kb.vmware.com/s/article/80181"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713"
},
{
"name": "GLSA-202104-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202104-05"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Grub",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "All grub2 versions before 2.06"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Out-of-bounds Write leading to Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-05-01T01:08:06",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "DSA-4735",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2020/dsa-4735"
},
{
"name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.openwall.com/lists/oss-security/2020/07/29/3"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825243"
},
{
"name": "VU#174059",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "https://www.kb.cert.org/vuls/id/174059"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20200731-0008/"
},
{
"name": "USN-4432-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4432-1/"
},
{
"name": "20200804 GRUB2 Arbitrary Code Execution Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY"
},
{
"name": "openSUSE-SU-2020:1169",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html"
},
{
"name": "openSUSE-SU-2020:1168",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://kb.vmware.com/s/article/80181"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713"
},
{
"name": "GLSA-202104-05",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202104-05"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2020-10713",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Grub",
"version": {
"version_data": [
{
"version_value": "All grub2 versions before 2.06"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Out-of-bounds Write leading to Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4735",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2020/dsa-4735"
},
{
"name": "[oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities",
"refsource": "MLIST",
"url": "http://www.openwall.com/lists/oss-security/2020/07/29/3"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1825243",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1825243"
},
{
"name": "VU#174059",
"refsource": "CERT-VN",
"url": "https://www.kb.cert.org/vuls/id/174059"
},
{
"name": "https://security.netapp.com/advisory/ntap-20200731-0008/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20200731-0008/"
},
{
"name": "USN-4432-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4432-1/"
},
{
"name": "20200804 GRUB2 Arbitrary Code Execution Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-grub2-code-exec-xLePCAPY"
},
{
"name": "openSUSE-SU-2020:1169",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00017.html"
},
{
"name": "openSUSE-SU-2020:1168",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00016.html"
},
{
"name": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/",
"refsource": "MISC",
"url": "https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/"
},
{
"name": "https://kb.vmware.com/s/article/80181",
"refsource": "MISC",
"url": "https://kb.vmware.com/s/article/80181"
},
{
"name": "https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713",
"refsource": "MISC",
"url": "https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713"
},
{
"name": "GLSA-202104-05",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202104-05"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2020-10713",
"datePublished": "2020-07-30T12:58:30",
"dateReserved": "2020-03-20T00:00:00",
"dateUpdated": "2024-08-04T11:14:14.235Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24637 (GCVE-0-2020-24637)
Vulnerability from cvelistv5 – Published: 2020-12-11 01:33 – Updated: 2024-08-04 15:19
VLAI?
EPSS
Summary
Two vulnerabilities in ArubaOS GRUB2 implementation allows for an attacker to bypass secureboot. Successful exploitation of this vulnerability this could lead to remote compromise of system integrity by allowing an attacker to load an untrusted or modified kernel in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
Severity ?
No CVSS data available.
CWE
- remote buffer overflow
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| n/a | Aruba 9000 Gateway |
Affected:
2.1.0.1
Affected: 2.2.0.0 and below |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:19:09.053Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Aruba 9000 Gateway",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2.1.0.1"
},
{
"status": "affected",
"version": "2.2.0.0 and below"
}
]
},
{
"product": "Aruba 7000 Series Mobility Controllers",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "6.4.4.23"
},
{
"status": "affected",
"version": "6.5.4.17"
},
{
"status": "affected",
"version": "8.2.2.9"
},
{
"status": "affected",
"version": "8.3.0.13"
},
{
"status": "affected",
"version": "8.5.0.10"
},
{
"status": "affected",
"version": "8.6.0.5"
},
{
"status": "affected",
"version": "8.7.0.0 and below"
}
]
},
{
"product": "Aruba 7200 Series Mobility Controllers",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "6.4.4.23"
},
{
"status": "affected",
"version": "6.5.4.17"
},
{
"status": "affected",
"version": "8.2.2.9"
},
{
"status": "affected",
"version": "8.3.0.13"
},
{
"status": "affected",
"version": "8.5.0.10"
},
{
"status": "affected",
"version": "8.6.0.5"
},
{
"status": "affected",
"version": "8.7.0.0 and below"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Two vulnerabilities in ArubaOS GRUB2 implementation allows for an attacker to bypass secureboot. Successful exploitation of this vulnerability this could lead to remote compromise of system integrity by allowing an attacker to load an untrusted or modified kernel in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "remote buffer overflow",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-12-11T01:33:22",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-alert@hpe.com",
"ID": "CVE-2020-24637",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Aruba 9000 Gateway",
"version": {
"version_data": [
{
"version_value": "2.1.0.1"
},
{
"version_value": "2.2.0.0 and below"
}
]
}
},
{
"product_name": "Aruba 7000 Series Mobility Controllers",
"version": {
"version_data": [
{
"version_value": "6.4.4.23"
},
{
"version_value": "6.5.4.17"
},
{
"version_value": "8.2.2.9"
},
{
"version_value": "8.3.0.13"
},
{
"version_value": "8.5.0.10"
},
{
"version_value": "8.6.0.5"
},
{
"version_value": "8.7.0.0 and below"
}
]
}
},
{
"product_name": "Aruba 7200 Series Mobility Controllers",
"version": {
"version_data": [
{
"version_value": "6.4.4.23"
},
{
"version_value": "6.5.4.17"
},
{
"version_value": "8.2.2.9"
},
{
"version_value": "8.3.0.13"
},
{
"version_value": "8.5.0.10"
},
{
"version_value": "8.6.0.5"
},
{
"version_value": "8.7.0.0 and below"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Two vulnerabilities in ArubaOS GRUB2 implementation allows for an attacker to bypass secureboot. Successful exploitation of this vulnerability this could lead to remote compromise of system integrity by allowing an attacker to load an untrusted or modified kernel in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "remote buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2020-24637",
"datePublished": "2020-12-11T01:33:22",
"dateReserved": "2020-08-25T00:00:00",
"dateUpdated": "2024-08-04T15:19:09.053Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24633 (GCVE-0-2020-24633)
Vulnerability from cvelistv5 – Published: 2020-12-11 01:26 – Updated: 2024-08-04 15:19
VLAI?
EPSS
Summary
There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending especially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211) of access-points or controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
Severity ?
No CVSS data available.
CWE
- remote buffer overflow
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| n/a | Aruba 9000 Gateway |
Affected:
2.1.0.1
Affected: 2.2.0.0 and below |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:19:09.283Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Aruba 9000 Gateway",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2.1.0.1"
},
{
"status": "affected",
"version": "2.2.0.0 and below"
}
]
},
{
"product": "Aruba 7000 Series Mobility Controllers",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "6.4.4.23"
},
{
"status": "affected",
"version": "6.5.4.17"
},
{
"status": "affected",
"version": "8.2.2.9"
},
{
"status": "affected",
"version": "8.3.0.13"
},
{
"status": "affected",
"version": "8.5.0.10"
},
{
"status": "affected",
"version": "8.6.0.5"
},
{
"status": "affected",
"version": "8.7.0.0 and below"
}
]
},
{
"product": "Aruba 7200 Series Mobility Controllers",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "6.4.4.23"
},
{
"status": "affected",
"version": "6.5.4.17"
},
{
"status": "affected",
"version": "8.2.2.9"
},
{
"status": "affected",
"version": "8.3.0.13"
},
{
"status": "affected",
"version": "8.5.0.10"
},
{
"status": "affected",
"version": "8.6.0.5"
},
{
"status": "affected",
"version": "8.7.0.0 and below"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending especially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211) of access-points or controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "remote buffer overflow",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-12-11T01:26:14",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-alert@hpe.com",
"ID": "CVE-2020-24633",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Aruba 9000 Gateway",
"version": {
"version_data": [
{
"version_value": "2.1.0.1"
},
{
"version_value": "2.2.0.0 and below"
}
]
}
},
{
"product_name": "Aruba 7000 Series Mobility Controllers",
"version": {
"version_data": [
{
"version_value": "6.4.4.23"
},
{
"version_value": "6.5.4.17"
},
{
"version_value": "8.2.2.9"
},
{
"version_value": "8.3.0.13"
},
{
"version_value": "8.5.0.10"
},
{
"version_value": "8.6.0.5"
},
{
"version_value": "8.7.0.0 and below"
}
]
}
},
{
"product_name": "Aruba 7200 Series Mobility Controllers",
"version": {
"version_data": [
{
"version_value": "6.4.4.23"
},
{
"version_value": "6.5.4.17"
},
{
"version_value": "8.2.2.9"
},
{
"version_value": "8.3.0.13"
},
{
"version_value": "8.5.0.10"
},
{
"version_value": "8.6.0.5"
},
{
"version_value": "8.7.0.0 and below"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending especially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211) of access-points or controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "remote buffer overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2020-24633",
"datePublished": "2020-12-11T01:26:14",
"dateReserved": "2020-08-25T00:00:00",
"dateUpdated": "2024-08-04T15:19:09.283Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-24634 (GCVE-0-2020-24634)
Vulnerability from cvelistv5 – Published: 2020-12-11 01:22 – Updated: 2024-08-04 15:19
VLAI?
EPSS
Summary
An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
Severity ?
No CVSS data available.
CWE
- remote injection of arbitrary commands
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| n/a | Aruba 9000 Gateway |
Affected:
2.1.0.1
Affected: 2.2.0.0 and below |
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T15:19:09.075Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Aruba 9000 Gateway",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "2.1.0.1"
},
{
"status": "affected",
"version": "2.2.0.0 and below"
}
]
},
{
"product": "Aruba 7000 Series Mobility Controllers",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "6.4.4.23"
},
{
"status": "affected",
"version": "6.5.4.17"
},
{
"status": "affected",
"version": "8.2.2.9"
},
{
"status": "affected",
"version": "8.3.0.13"
},
{
"status": "affected",
"version": "8.5.0.10"
},
{
"status": "affected",
"version": "8.6.0.5"
},
{
"status": "affected",
"version": "8.7.0.0 and below"
}
]
},
{
"product": "Aruba 7200 Series Mobility Controllers",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "6.4.4.23"
},
{
"status": "affected",
"version": "6.5.4.17"
},
{
"status": "affected",
"version": "8.2.2.9"
},
{
"status": "affected",
"version": "8.3.0.13"
},
{
"status": "affected",
"version": "8.5.0.10"
},
{
"status": "affected",
"version": "8.6.0.5"
},
{
"status": "affected",
"version": "8.7.0.0 and below"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "remote injection of arbitrary commands",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-12-11T01:22:50",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security-alert@hpe.com",
"ID": "CVE-2020-24634",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Aruba 9000 Gateway",
"version": {
"version_data": [
{
"version_value": "2.1.0.1"
},
{
"version_value": "2.2.0.0 and below"
}
]
}
},
{
"product_name": "Aruba 7000 Series Mobility Controllers",
"version": {
"version_data": [
{
"version_value": "6.4.4.23"
},
{
"version_value": "6.5.4.17"
},
{
"version_value": "8.2.2.9"
},
{
"version_value": "8.3.0.13"
},
{
"version_value": "8.5.0.10"
},
{
"version_value": "8.6.0.5"
},
{
"version_value": "8.7.0.0 and below"
}
]
}
},
{
"product_name": "Aruba 7200 Series Mobility Controllers",
"version": {
"version_data": [
{
"version_value": "6.4.4.23"
},
{
"version_value": "6.5.4.17"
},
{
"version_value": "8.2.2.9"
},
{
"version_value": "8.3.0.13"
},
{
"version_value": "8.5.0.10"
},
{
"version_value": "8.6.0.5"
},
{
"version_value": "8.7.0.0 and below"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "remote injection of arbitrary commands"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbnw04072en_us"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2020-24634",
"datePublished": "2020-12-11T01:22:50",
"dateReserved": "2020-08-25T00:00:00",
"dateUpdated": "2024-08-04T15:19:09.075Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…