cve/2024/CVE-2024-42501.md

31 lines
2.1 KiB
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-42501](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-42501)
![](https://img.shields.io/static/v1?label=Product&message=Aruba%20OS&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=10.3.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.5.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=10.6.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=6.5.4.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.10.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.11.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.12.0.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%2010.3.0.0%3A%2010.4.0.0%20and%20below%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%2010.5.0.0%3A%2010.6.0.0%20and%20below%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%2010.6.0.0%3A%2010.6.0.2%20and%20below%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%206.5.4.0%3A%208.9.0.0%20and%20below%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%208.10.0.0%3A%208.10.0.13%20and%20below%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%208.11.0.0%3A%208.12.0.0%20and%20below%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=Version%208.12.0.0%3A%208.12.0.1%20and%20below%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=blue)
### Description
An authenticated Path Traversal vulnerabilities exists in the ArubaOS. Successful exploitation of this vulnerability allows an attacker to install unsigned packages on the underlying operating system, enabling the threat actor to execute arbitrary code or install implants.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds