First published: Tue Nov 14 2023(Updated: )
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the BLE daemon service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | >=10.3.0.0<10.4.0.3 | |
Arubanetworks Arubaos | =10.5.0.0 | |
Hp Instantos | >=6.4.0.0<8.6.0.23 | |
Hp Instantos | >=8.10.0.0<8.10.0.9 | |
Hp Instantos | >=8.11.0.0<8.11.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45622 refers to unauthenticated Denial-of-Service (DoS) vulnerabilities in the BLE daemon service accessed via the PAPI protocol.
CVE-2023-45622 has a severity rating of 7.5 (high).
The following software versions are affected by CVE-2023-45622: - Arubanetworks Arubaos: 10.3.0.0 to 10.4.0.3, 10.5.0.0 - Hp Instantos: 6.4.0.0 to 8.6.0.23, 8.10.0.0 to 8.10.0.9, 8.11.0.0 to 8.11.2.0
CVE-2023-45622 can be exploited by sending specially crafted requests to the affected access point's BLE daemon service via the PAPI protocol.
It is recommended to update the affected software versions to the latest available versions provided by the vendors Arubanetworks and Hp to mitigate CVE-2023-45622.