A memory corruption vulnerability in ArubaOS-Switch could lead to unauthenticated remote code execution by receiving specially crafted packets. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| hpe | arubaos-switch | a.15.16.0026 | - |
| hpe | arubaos-switch | 16.01.0000 - 16.04.0027 | - |
| hpe | arubaos-switch | 16.05.0000 - 16.08.0027 |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
5
Affected Products
2
References
hpe / arubaos-switch
| - |
| hpe | arubaos-switch | 16.10.0001 - 16.10.0024 | - |
| hpe | arubaos-switch | 16.11.0001 - 16.11.0013 | - |
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H
Exploitability
Impact