cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-42505,https://securityvulnerability.io/vulnerability/CVE-2024-42505,Unauthenticated Remote Code Execution through Command Injection Vulnerabilities,"The vulnerability presents command injection risks within Aruba's Command Line Interface (CLI) service, which could allow unauthorized remote code execution. Attackers may exploit this vulnerability by sending specially crafted packets to the Protocol for Access Point Management Interface (PAPI) over UDP port 8211. Successful exploitation permits execution of arbitrary code with elevated privileges on the operating system, posing significant security risks to affected Aruba Access Points. Organizations utilizing vulnerable products should assess their exposure and apply recommended mitigations to secure their network infrastructure.",HP,Aruba Os,9.8,CRITICAL,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-25T01:15:00.000Z,0 CVE-2024-42506,https://securityvulnerability.io/vulnerability/CVE-2024-42506,Unauthenticated Remote Code Execution Vulnerability in Aruba's Access Point Management Protocol,"The vulnerability presents a command injection issue within the CLI services utilized by Aruba's Access Point management protocol (PAPI). This allows for unauthenticated attackers to send malicious packets to the UDP port 8211, potentially resulting in remote code execution. Such exploitation enables unauthorized execution of arbitrary commands as a privileged user on the affected operating systems, posing significant security risks to network infrastructure relying on Aruba access points.",HP,Aruba Os,9.8,CRITICAL,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-25T01:15:00.000Z,0 CVE-2024-42507,https://securityvulnerability.io/vulnerability/CVE-2024-42507,Unauthenticated Remote Code Execution Vulnerability in PAPI CLI Service,"The vulnerability arises from command injection flaws present in the Command Line Interface (CLI) service associated with Aruba's Access Point management protocol (PAPI). By exploiting these vulnerabilities, an attacker can send specially crafted packets to the UDP port 8211, leading to unauthorized remote code execution. This allows the attacker to run arbitrary code with elevated privileges on the underlying operating system. Organizations using affected Aruba Access Points should take immediate action to assess their security posture and apply any necessary updates or mitigations.",HP,Aruba Os,9.8,CRITICAL,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-25T01:15:00.000Z,0