An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| arubanetworks | arubaos | 8.2.2.10 | - |
| arubanetworks | arubaos | 8.3.0.0 - 8.3.0.14 | - |
| arubanetworks | arubaos |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7
Affected Products
2
References
arubanetworks / arubaos
| 8.4.0.0 - 8.5.0.11 |
| - |
| arubanetworks | arubaos | 8.6.0.0 - 8.6.0.6 | - |
| arubanetworks | arubaos | 8.7.0.0 - 8.7.1.0 | - |
| arubanetworks | sd-wan | 2.1.0.2 | - |
| arubanetworks | sd-wan | 2.2.0.0 - 2.2.0.1 | - |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Exploitability
Impact