First published: Tue Aug 06 2024(Updated: )
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
ArubaOS | >=10.4.0.0<10.4.1.2 | |
ArubaOS | =10.6.0.0 | |
hp InstantOS | >=8.10.0.0<8.10.0.13 | |
hp InstantOS | >=8.12.0.0<8.12.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-42399 presents multiple unauthenticated Denial-of-Service (DoS) vulnerabilities in affected devices.
To fix CVE-2024-42399, you should upgrade to the latest patched version of ArubaOS or HP InstantOS as recommended by the vendor.
CVE-2024-42399 affects several versions of ArubaOS and HP InstantOS, specifically those within specified version ranges.
Exploiting CVE-2024-42399 can interrupt the normal operation of affected Access Points, leading to service disruption.
CVE-2024-42399 is classified as unauthenticated, making it potentially easier for attackers to exploit without prior access.