First published: Tue Nov 14 2023(Updated: )
There is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the access point.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | >=10.3.0.0<10.4.0.3 | |
Arubanetworks Arubaos | =10.5.0.0 | |
Hp Instantos | >=6.4.0.0<8.6.0.23 | |
Hp Instantos | >=8.10.0.0<8.10.0.9 | |
Hp Instantos | >=8.11.0.0<8.11.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45619 is an arbitrary file deletion vulnerability in the RSSI service accessed by PAPI (Aruba's access point management protocol).
CVE-2023-45619 has a severity rating of 8.2 (high).
The affected software of CVE-2023-45619 includes ArubaOS versions 10.3.0.0 to 10.4.0.3, ArubaOS version 10.5.0.0, and HP InstantOS versions 6.4.0.0 to 8.11.2.0.
CVE-2023-45619 can be exploited by an attacker to delete arbitrary files on the underlying operating system, potentially leading to unauthorized access or disruption of services.
To fix CVE-2023-45619, it is recommended to apply the necessary security patches provided by Aruba Networks or HP, depending on the affected software version.