mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-30 02:00:53 +00:00
235 lines
8.5 KiB
JSON
235 lines
8.5 KiB
JSON
![]() |
{
|
||
|
"id": "CVE-2020-24634",
|
||
|
"sourceIdentifier": "security-alert@hpe.com",
|
||
|
"published": "2020-12-11T02:15:11.057",
|
||
|
"lastModified": "2021-11-18T18:17:05.807",
|
||
|
"vulnStatus": "Analyzed",
|
||
|
"descriptions": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below."
|
||
|
},
|
||
|
{
|
||
|
"lang": "es",
|
||
|
"value": "Un atacante es capaz de inyectar remotamente comandos arbitrarios mediante el env\u00edo de paquetes especialmente dise\u00f1ados destinados al puerto UDP (8211) de PAPI (protocolo de Aruba Networks AP Management) de puntos de acceso o controladores en Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers versiones: 2.1.0.1, 2.2.0.0 y por debajo; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 y por debajo; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 y por debajo"
|
||
|
}
|
||
|
],
|
||
|
"metrics": {
|
||
|
"cvssMetricV31": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "3.1",
|
||
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
|
"attackVector": "NETWORK",
|
||
|
"attackComplexity": "LOW",
|
||
|
"privilegesRequired": "NONE",
|
||
|
"userInteraction": "NONE",
|
||
|
"scope": "UNCHANGED",
|
||
|
"confidentialityImpact": "HIGH",
|
||
|
"integrityImpact": "HIGH",
|
||
|
"availabilityImpact": "HIGH",
|
||
|
"baseScore": 9.8,
|
||
|
"baseSeverity": "CRITICAL"
|
||
|
},
|
||
|
"exploitabilityScore": 3.9,
|
||
|
"impactScore": 5.9
|
||
|
}
|
||
|
],
|
||
|
"cvssMetricV2": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"cvssData": {
|
||
|
"version": "2.0",
|
||
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
|
"accessVector": "NETWORK",
|
||
|
"accessComplexity": "LOW",
|
||
|
"authentication": "NONE",
|
||
|
"confidentialityImpact": "COMPLETE",
|
||
|
"integrityImpact": "COMPLETE",
|
||
|
"availabilityImpact": "COMPLETE",
|
||
|
"baseScore": 10.0
|
||
|
},
|
||
|
"baseSeverity": "HIGH",
|
||
|
"exploitabilityScore": 10.0,
|
||
|
"impactScore": 10.0,
|
||
|
"acInsufInfo": false,
|
||
|
"obtainAllPrivilege": false,
|
||
|
"obtainUserPrivilege": false,
|
||
|
"obtainOtherPrivilege": false,
|
||
|
"userInteractionRequired": false
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
"weaknesses": [
|
||
|
{
|
||
|
"source": "nvd@nist.gov",
|
||
|
"type": "Primary",
|
||
|
"description": [
|
||
|
{
|
||
|
"lang": "en",
|
||
|
"value": "CWE-77"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"configurations": [
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "8.2.2.10",
|
||
|
"matchCriteriaId": "49A45927-D609-48E3-A5E5-FEB977F4F58D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.3.0.0",
|
||
|
"versionEndExcluding": "8.3.0.14",
|
||
|
"matchCriteriaId": "D3E3ED71-0BA0-4D76-9BB7-D84FA571C4D0"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.4.0.0",
|
||
|
"versionEndExcluding": "8.5.0.11",
|
||
|
"matchCriteriaId": "419BC61F-B002-4848-BB6B-51CA15C8E6F2"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.6.0.0",
|
||
|
"versionEndExcluding": "8.6.0.6",
|
||
|
"matchCriteriaId": "C6A4597E-0267-4DA8-BFFB-513BEA7D04D4"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "8.7.0.0",
|
||
|
"versionEndExcluding": "8.7.1.0",
|
||
|
"matchCriteriaId": "894088FF-5838-4CE7-AA31-CE7FB247E271"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7005:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FE128072-9444-40D5-AC86-BB317869EB97"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7008:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "F747F71E-66BC-4776-BCCC-3123F8EEEBC6"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "59612211-5054-44DC-B028-61A2C5C6133D"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7024:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "15FE873C-3C45-4EA3-9AD1-D07F132BC31F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "E8E68DB6-149B-4469-BD27-69F1AC59166F"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "2E9AA178-1327-402E-8740-8409ECA448BC"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "9969F899-4D7A-4DD5-B81D-DB16B20CF86A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CF33BAD0-0596-4910-B096-99E2033F73D8"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "FDDFDA5E-3895-463A-86EA-1823EC1B5045"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "3BBA9A71-BE10-471A-A8BE-5CCB8CE8393F"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "AND",
|
||
|
"nodes": [
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:*",
|
||
|
"versionEndExcluding": "2.1.0.2",
|
||
|
"matchCriteriaId": "A206DE28-E15A-437B-BC1C-261F32F24F3A"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": true,
|
||
|
"criteria": "cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:*",
|
||
|
"versionStartIncluding": "2.2.0.0",
|
||
|
"versionEndExcluding": "2.2.0.1",
|
||
|
"matchCriteriaId": "A1D1957E-1DFE-495B-8DF5-C1640857DDF4"
|
||
|
}
|
||
|
]
|
||
|
},
|
||
|
{
|
||
|
"operator": "OR",
|
||
|
"negate": false,
|
||
|
"cpeMatch": [
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "CFA13FF5-7C60-48B4-AF46-18A9F19D5D42"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "0B1EB3D9-77B5-4DBE-9518-23DD0DA06BC9"
|
||
|
},
|
||
|
{
|
||
|
"vulnerable": false,
|
||
|
"criteria": "cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*",
|
||
|
"matchCriteriaId": "17162DB3-973E-47C6-9157-39A0E94603F2"
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|
||
|
],
|
||
|
"references": [
|
||
|
{
|
||
|
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04072en_us",
|
||
|
"source": "security-alert@hpe.com",
|
||
|
"tags": [
|
||
|
"Vendor Advisory"
|
||
|
]
|
||
|
}
|
||
|
]
|
||
|
}
|