First published: Fri Dec 11 2020(Updated: )
An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | <8.2.2.10 | |
Arubanetworks Arubaos | >=8.3.0.0<8.3.0.14 | |
Arubanetworks Arubaos | >=8.4.0.0<8.5.0.11 | |
Arubanetworks Arubaos | >=8.6.0.0<8.6.0.6 | |
Arubanetworks Arubaos | >=8.7.0.0<8.7.1.0 | |
Arubanetworks 7005 | ||
Arubanetworks 7008 | ||
Arubanetworks 7010 | ||
Arubanetworks 7024 | ||
Arubanetworks 7030 | ||
Arubanetworks 7205 | ||
Arubanetworks 7210 | ||
Arubanetworks 7220 | ||
Arubanetworks 7240xm | ||
Arubanetworks 7280 | ||
Arubanetworks Sd-wan | <2.1.0.2 | |
Arubanetworks Sd-wan | >=2.2.0.0<2.2.0.1 | |
Arubanetworks 9004 | ||
Arubanetworks 9004-lte | ||
Arubanetworks 9012 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-24634 is a vulnerability that allows an attacker to remotely inject arbitrary commands by sending specially crafted packets to the PAPI UDP port of Aruba access-points or controllers.
ArubaOS versions 8.2.2.10, 8.3.0.0 to 8.3.0.14, 8.4.0.0 to 8.5.0.11, 8.6.0.0 to 8.6.0.6, and 8.7.0.0 to 8.7.1.0 are affected by CVE-2020-24634.
CVE-2020-24634 has a severity rating of 9.8, which is classified as critical.
The CWE ID for CVE-2020-24634 is 77.
It is recommended to update ArubaOS to a patched version provided by Aruba Networks.