First published: Tue Nov 14 2023(Updated: )
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the soft ap daemon accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected access point.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | >=10.3.0.0<10.4.0.3 | |
Arubanetworks Arubaos | =10.5.0.0 | |
Hp Instantos | >=6.4.0.0<8.6.0.23 | |
Hp Instantos | >=8.10.0.0<8.10.0.9 | |
Hp Instantos | >=8.11.0.0<8.11.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45624 is an unauthenticated Denial-of-Service (DoS) vulnerability in the soft ap daemon accessed via the PAPI protocol.
Successful exploitation of CVE-2023-45624 allows an attacker to interrupt the normal operation of the affected access point, causing a Denial-of-Service (DoS) condition.
CVE-2023-45624 affects Arubanetworks Arubaos versions 10.3.0.0 to 10.4.0.3, and version 10.5.0.0.
CVE-2023-45624 has a severity rating of high, with a score of 7.5.
Apply the relevant patches or updates provided by Arubanetworks or HP to mitigate CVE-2023-45624.