First published: Fri Dec 11 2020(Updated: )
There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending especially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211) of access-points or controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | <6.4.4.24 | |
Arubanetworks Arubaos | >=6.5.0.0<6.5.4.18 | |
Arubanetworks Arubaos | >=8.0.0.0<8.2.2.10 | |
Arubanetworks Arubaos | >=8.3.0.0<8.3.0.14 | |
Arubanetworks Arubaos | >=8.4.0.0<8.5.0.11 | |
Arubanetworks Arubaos | >=8.6.0.0<8.6.0.6 | |
Arubanetworks Arubaos | >=8.7.0.0<8.7.1.0 | |
Arubanetworks 7005 | ||
Arubanetworks 7008 | ||
Arubanetworks 7010 | ||
Arubanetworks 7024 | ||
Arubanetworks 7030 | ||
Arubanetworks 7205 | ||
Arubanetworks 7210 | ||
Arubanetworks 7220 | ||
Arubanetworks 7240xm | ||
Arubanetworks 7280 | ||
Arubanetworks Sd-wan | <2.1.0.2 | |
Arubanetworks Sd-wan | >=2.2.0.0<2.2.0.1 | |
Arubanetworks 9004 | ||
Arubanetworks 9004-lte | ||
Arubanetworks 9012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24633 is a vulnerability that allows unauthenticated remote code execution by sending specially crafted packets to the PAPI UDP port of Aruba Networks access points or controllers.
ArubaOS versions between 6.4.4.24 and 8.7.1.0 are affected by CVE-2020-24633.
CVE-2020-24633 has a severity rating of 9.8 out of 10, indicating a critical vulnerability.
To fix CVE-2020-24633, it is recommended to update ArubaOS to a version that is not affected by the vulnerability.
More information about CVE-2020-24633 can be found at the following link: [link](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04072en_us).