cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-45614,https://securityvulnerability.io/vulnerability/CVE-2023-45614,Buffer Overflow Vulnerabilities in Aruba Access Point Management Protocol,"The discovered buffer overflow vulnerabilities in Aruba's access point management protocol (PAPI) enable unauthenticated remote attackers to execute arbitrary code on affected systems. By sending specially crafted packets to the PAPI UDP service on port 8211, attackers can exploit these flaws, ultimately gaining privileged access to the underlying operating system. Organizations using Aruba Access Points should take immediate action to assess their exposure and apply available patches to mitigate potential risks associated with these vulnerabilities.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,9.8,CRITICAL,0.003010000102221966,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45617,https://securityvulnerability.io/vulnerability/CVE-2023-45617,Arbitrary File Deletion Vulnerability in Aruba's Access Point Management Protocol,"Aruba's access point management protocol, known as PAPI, has a security flaw that allows arbitrary file deletion through its CLI service. When exploited, this vulnerability can lead to the deletion of critical files on the operating system, potentially disrupting normal operation and compromising the integrity of the access points. Organizations utilizing Aruba products should take immediate action to mitigate the risks associated with this vulnerability to safeguard their network infrastructure.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,8.2,HIGH,0.0007999999797903001,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45615,https://securityvulnerability.io/vulnerability/CVE-2023-45615,Buffer Overflow Vulnerability in Aruba's Access Point Management Protocol,"The vulnerability involves buffer overflow flaws within the command-line interface (CLI) service of Aruba's access point management protocol (PAPI). These flaws can be exploited by sending specially crafted packets to the UDP port 8211. An attacker can execute arbitrary code with elevated privileges on the affected system, potentially compromising the integrity and security of network operations.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,9.8,CRITICAL,0.003010000102221966,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45616,https://securityvulnerability.io/vulnerability/CVE-2023-45616,Buffer Overflow Vulnerability in AirWave Client Service by Aruba Networks,"A buffer overflow vulnerability exists within the AirWave client service, primarily exposing Aruba Networks' devices to potential threats. Malicious actors can exploit this vulnerability by sending specially crafted packets to the PAPI UDP port (8211), resulting in the possibility of unauthenticated remote code execution. If successfully exploited, this could permit the execution of arbitrary code with privileged user permissions on the affected operating system, posing significant security risks. Organizations utilizing the AirWave service should take immediate action to mitigate this vulnerability and protect their systems.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,9.8,CRITICAL,0.003010000102221966,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45619,https://securityvulnerability.io/vulnerability/CVE-2023-45619,Arbitrary File Deletion Vulnerability in Aruba Access Point Management Protocol,"An arbitrary file deletion vulnerability exists within the RSSI service, accessed via Aruba's proprietary management protocol. If successfully exploited, adversaries could delete arbitrary files on the underlying operating system. This could lead to severe disruptions in the normal operation of the affected access point, potentially compromising its integrity and the overall network security.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,8.2,HIGH,0.0007999999797903001,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45620,https://securityvulnerability.io/vulnerability/CVE-2023-45620,Unauthenticated Denial-of-Service Vulnerabilities in Aruba Networks Access Points,"Unauthenticated Denial-of-Service vulnerabilities have been identified in the CLI service accessed through the PAPI protocol on Aruba Networks Access Points. These vulnerabilities allow attackers to disrupt normal operations, potentially leading to service interruptions. Organizations using affected Aruba products should review their security posture and implement recommended mitigations to protect against exploitation.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45626,https://securityvulnerability.io/vulnerability/CVE-2023-45626,Authenticated Vulnerability in Aruba Networks Products,"An authenticated vulnerability has been detected in Aruba Networks products, enabling attackers to achieve highly privileged persistent arbitrary code execution. This vulnerability persists across boot cycles, potentially allowing unauthorized users to maintain control over the affected devices, thereby compromising the security integrity of the network.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,7.2,HIGH,0.0009800000116229057,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45618,https://securityvulnerability.io/vulnerability/CVE-2023-45618,Arbitrary File Deletion Vulnerability in Aruba's Access Point Management Protocol,"The AirWave client service used by Aruba's PAPI protocol is vulnerable to arbitrary file deletion, allowing attackers to exploit these flaws for unauthorized file removal. This can disrupt the normal operations of the system and compromise the integrity of the managed access points, posing significant security risks. Organizations using vulnerable versions should prioritize applying security patches to mitigate the threat associated with unauthorized file manipulation.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,8.2,HIGH,0.0007999999797903001,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45621,https://securityvulnerability.io/vulnerability/CVE-2023-45621,Unauthenticated Denial-of-Service Vulnerability in Aruba Access Points,"The vulnerability involves unauthenticated Denial-of-Service (DoS) flaws that can be exploited through the Command Line Interface (CLI) service via the PAPI protocol. When successfully exploited, these vulnerabilities can disrupt the normal functioning of Aruba access points, potentially impacting network availability and performance.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45622,https://securityvulnerability.io/vulnerability/CVE-2023-45622,Unauthenticated Denial-of-Service Vulnerability in Aruba Access Points,"The BLE daemon service in Aruba access points is susceptible to unauthenticated Denial-of-Service vulnerabilities via the PAPI protocol. This could allow an attacker to disrupt normal operations, leading to significant service interruptions.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45623,https://securityvulnerability.io/vulnerability/CVE-2023-45623,Unauthenticated Denial-of-Service Vulnerability in Aruba Networks Access Points,"A series of unauthenticated denial-of-service vulnerabilities have been identified in the Wi-Fi Uplink service of Aruba Networks access points, specifically through the PAPI protocol. Exploiting these vulnerabilities allows an attacker to disrupt the normal operating conditions of the access point, potentially leading to significant network outages and performance degradation. It is crucial for organizations utilizing these devices to remain vigilant and apply the recommended patches to mitigate risks associated with this security flaw.",HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45624,https://securityvulnerability.io/vulnerability/CVE-2023-45624,Denial-of-Service Vulnerability in Aruba Networks Access Points,"An unauthenticated Denial-of-Service vulnerability exists in the soft AP daemon accessed via the PAPI protocol of Aruba Networks Access Points. Exploiting this vulnerability can interrupt the normal operation of the affected devices, leading to potential disruptions in network services.",HP,"Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ",7.5,HIGH,0.0009200000204145908,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45625,https://securityvulnerability.io/vulnerability/CVE-2023-45625,Command Injection Vulnerabilities in Aruba Networks Products,"Multiple authenticated command injection vulnerabilities exist in the command line interface of Aruba Networks products. Successful exploitation allows attackers to execute arbitrary commands with privileged access to the underlying operating system, potentially compromising system integrity and security. Organizations must apply recommended patches to mitigate these vulnerabilities and protect their network infrastructure.",HP,"Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; ",7.2,HIGH,0.0007300000288523734,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0 CVE-2023-45627,https://securityvulnerability.io/vulnerability/CVE-2023-45627,Authenticated DoS Vulnerability in Aruba Access Points,An authenticated denial-of-service vulnerability has been identified in the CLI service of Aruba Access Points. This vulnerability allows an attacker to disrupt normal operations by exploiting the service when authenticated. Effective mitigation is essential to ensure continuous availability of the affected access points and to prevent operational interruptions.,HP,Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series;,4.3,MEDIUM,0.0007200000109151006,false,,false,false,false,,,false,false,,2023-11-14T23:15:00.000Z,0