First published: Fri Dec 11 2020(Updated: )
There are multiple buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending especially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211) of access-points or controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
arubanetworks ArubaOS | <6.4.4.24 | |
arubanetworks ArubaOS | >=6.5.0.0<6.5.4.18 | |
arubanetworks ArubaOS | >=8.0.0.0<8.2.2.10 | |
arubanetworks ArubaOS | >=8.3.0.0<8.3.0.14 | |
arubanetworks ArubaOS | >=8.4.0.0<8.5.0.11 | |
arubanetworks ArubaOS | >=8.6.0.0<8.6.0.6 | |
arubanetworks ArubaOS | >=8.7.0.0<8.7.1.0 | |
Aruba Networks 7005 | ||
Aruba Networks 7008 | ||
Aruba 7010 | ||
Aruba Networks 7024 | ||
Aruba Networks 7030 | ||
Aruba Networks 7205 | ||
Aruba Networks 7210 | ||
Aruba Networks 7220 | ||
Aruba Networks 7240XM | ||
Aruba Networks 7280 | ||
Aruba Networks SD-WAN | <2.1.0.2 | |
Aruba Networks SD-WAN | >=2.2.0.0<2.2.0.1 | |
Aruba Networks 9004 | ||
Arubanetworks 9004-LTE | ||
Aruba Networks 9012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24633 is a vulnerability that allows unauthenticated remote code execution by sending specially crafted packets to the PAPI UDP port of Aruba Networks access points or controllers.
ArubaOS versions between 6.4.4.24 and 8.7.1.0 are affected by CVE-2020-24633.
CVE-2020-24633 has a severity rating of 9.8 out of 10, indicating a critical vulnerability.
To fix CVE-2020-24633, it is recommended to update ArubaOS to a version that is not affected by the vulnerability.
More information about CVE-2020-24633 can be found at the following link: [link](https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04072en_us).