cve-2015-1388
Vulnerability from cvelistv5
Published
2015-03-24 17:00
Modified
2024-08-06 04:40
Severity ?
EPSS score ?
Summary
The "RAP console" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T04:40:18.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2015-03-18T00:00:00", "descriptions": [ { "lang": "en", "value": "The \"RAP console\" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2015-03-24T16:57:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-1388", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The \"RAP console\" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt", "refsource": "CONFIRM", "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2015-1388", "datePublished": "2015-03-24T17:00:00", "dateReserved": "2015-01-27T00:00:00", "dateUpdated": "2024-08-06T04:40:18.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"6.2.3.9\", \"matchCriteriaId\": \"226C7777-ECCC-49D2-8EB1-DD9EF57C90CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C9792484-1C9D-4A94-8BC0-F3389388037A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83D0BE40-36C1-4177-A545-BC1F7435C1BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E6A8B524-49C4-4069-9F08-795EE3ABEFEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BB28256E-588F-4FB4-896A-15AF51F96992\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2652D8B-C361-4349-B7FC-3C40BF0A3F43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"22013B3A-82E6-4960-9D6D-0BEF991153F9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"923BCFD5-15F0-4088-9E24-7CA5626AAB5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F73767C4-E464-430D-AE4D-80544CDD5023\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"772E90DA-9454-4E4A-9E8E-82D9F6CCAFC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.1.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"779FF186-DBB8-4299-862F-81BAF411AF62\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6CFA43C9-68E3-4F6B-ACAD-38BB7E1CDB42\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F76952D-23C9-44BD-A93B-4EA5E934F481\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E4E3800-202E-4599-8F9C-FA59A36006EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.2.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56CC06B0-0A1E-48CB-8C0E-77F287D7089F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.2.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"01B03A21-2068-4D87-BB91-23A2248450ED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.2.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F679BAD-2DD2-4C68-9972-719B00E1B985\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.2.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7E1847B-18D8-48B5-96AB-289B634D4E5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.2.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1043AAAB-7552-445A-ACDA-D09CDCC1CBC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"28014EEA-14CC-4BC7-8762-D40E5C4BA9B6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9240A24-DDAD-4796-81DA-C884F6816628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"448B58B9-6693-4CF5-8E2A-686E62C6751A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D56FECAA-0C24-4F05-8782-08D9344BD177\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"76414368-D5D8-4A72-8314-2FF4B393763E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B7A40A06-AF71-4D9A-B2D5-4B0B3E29C602\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C405B24F-ED7E-45C6-9752-0970B62BFE14\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51A1AACA-EACF-4E7B-A03D-7BD5875F421E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43D8D27F-7B6E-4444-950D-00EE3C739BF7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33DE6F99-3E4E-4F54-90D3-FB542818C821\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A183A679-A166-43A6-B087-42E836CB7F40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"74B79D94-3A33-4FEB-A335-CE6E8A4C7DCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"280CDEE1-4B4B-45B1-8D3F-0E115050F1EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48D60A7F-143A-4A99-8ABD-77C6EC60392D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEA14349-BACC-4A0C-A5AD-0EAA17E1F544\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.3.1.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4E02C8F-5161-4331-A2E7-1333AF9A0EEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.4.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90646603-434E-498B-A4DF-4ABC8666CE4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.4.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE3AFA15-9EAF-4833-BE89-F9EB7E9C9B86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:6.4.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6184E5F6-A647-4A0C-9A96-F666D18F4053\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"The \\\"RAP console\\\" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors.\"}, {\"lang\": \"es\", \"value\": \"La caracter\\u00edstica \u0027RAP console\u0027 en ArubaOS 5.x hasta 6.2.x, 6.3.x anterior a 6.3.1.15, y 6.4.x anterior a 6.4.2.4 en los puntos de acceso de Aruba en el modo Remote Access Point (AP) permite a atacantes remotos ejecutar comandos arbitrarios a trav\\u00e9s de vectores no especificados.\"}]", "id": "CVE-2015-1388", "lastModified": "2024-11-21T02:25:19.483", "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2015-03-24T17:59:05.523", "references": "[{\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-78\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2015-1388\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2015-03-24T17:59:05.523\",\"lastModified\":\"2024-11-21T02:25:19.483\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The \\\"RAP console\\\" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors.\"},{\"lang\":\"es\",\"value\":\"La caracter\u00edstica \u0027RAP console\u0027 en ArubaOS 5.x hasta 6.2.x, 6.3.x anterior a 6.3.1.15, y 6.4.x anterior a 6.4.2.4 en los puntos de acceso de Aruba en el modo Remote Access Point (AP) permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de vectores no especificados.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-78\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"6.2.3.9\",\"matchCriteriaId\":\"226C7777-ECCC-49D2-8EB1-DD9EF57C90CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9792484-1C9D-4A94-8BC0-F3389388037A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83D0BE40-36C1-4177-A545-BC1F7435C1BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E6A8B524-49C4-4069-9F08-795EE3ABEFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BB28256E-588F-4FB4-896A-15AF51F96992\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2652D8B-C361-4349-B7FC-3C40BF0A3F43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22013B3A-82E6-4960-9D6D-0BEF991153F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"923BCFD5-15F0-4088-9E24-7CA5626AAB5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F73767C4-E464-430D-AE4D-80544CDD5023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"772E90DA-9454-4E4A-9E8E-82D9F6CCAFC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.1.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"779FF186-DBB8-4299-862F-81BAF411AF62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CFA43C9-68E3-4F6B-ACAD-38BB7E1CDB42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F76952D-23C9-44BD-A93B-4EA5E934F481\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E4E3800-202E-4599-8F9C-FA59A36006EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CC06B0-0A1E-48CB-8C0E-77F287D7089F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01B03A21-2068-4D87-BB91-23A2248450ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F679BAD-2DD2-4C68-9972-719B00E1B985\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7E1847B-18D8-48B5-96AB-289B634D4E5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1043AAAB-7552-445A-ACDA-D09CDCC1CBC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28014EEA-14CC-4BC7-8762-D40E5C4BA9B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9240A24-DDAD-4796-81DA-C884F6816628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"448B58B9-6693-4CF5-8E2A-686E62C6751A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D56FECAA-0C24-4F05-8782-08D9344BD177\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76414368-D5D8-4A72-8314-2FF4B393763E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7A40A06-AF71-4D9A-B2D5-4B0B3E29C602\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C405B24F-ED7E-45C6-9752-0970B62BFE14\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A1AACA-EACF-4E7B-A03D-7BD5875F421E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43D8D27F-7B6E-4444-950D-00EE3C739BF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33DE6F99-3E4E-4F54-90D3-FB542818C821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A183A679-A166-43A6-B087-42E836CB7F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74B79D94-3A33-4FEB-A335-CE6E8A4C7DCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"280CDEE1-4B4B-45B1-8D3F-0E115050F1EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48D60A7F-143A-4A99-8ABD-77C6EC60392D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEA14349-BACC-4A0C-A5AD-0EAA17E1F544\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.3.1.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4E02C8F-5161-4331-A2E7-1333AF9A0EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.4.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90646603-434E-498B-A4DF-4ABC8666CE4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.4.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE3AFA15-9EAF-4833-BE89-F9EB7E9C9B86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:6.4.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6184E5F6-A647-4A0C-9A96-F666D18F4053\"}]}]}],\"references\":[{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.