First published: Tue Nov 14 2023(Updated: )
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the BLE daemon service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected access point.
|Affected Software||Affected Version||How to fix|
CVE-2023-45622 refers to unauthenticated Denial-of-Service (DoS) vulnerabilities in the BLE daemon service accessed via the PAPI protocol.
CVE-2023-45622 has a severity rating of 7.5 (high).
The following software versions are affected by CVE-2023-45622: - Arubanetworks Arubaos: 10.3.0.0 to 10.4.0.3, 10.5.0.0 - Hp Instantos: 184.108.40.206 to 220.127.116.11, 18.104.22.168 to 22.214.171.124, 126.96.36.199 to 188.8.131.52
CVE-2023-45622 can be exploited by sending specially crafted requests to the affected access point's BLE daemon service via the PAPI protocol.
It is recommended to update the affected software versions to the latest available versions provided by the vendors Arubanetworks and Hp to mitigate CVE-2023-45622.