cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-42509,https://securityvulnerability.io/vulnerability/CVE-2024-42509,Unauthenticated Remote Code Execution Vulnerability in PAPI Due to Command Injection,"The CVE-2024-42509 vulnerability is an unauthenticated remote code execution flaw in the PAPI protocol used by Aruba Access Points from Hewlett Packard Enterprise (HPE). Exploiting this vulnerability allows attackers to execute arbitrary code as privileged users on the underlying operating system, posing a significant risk to affected devices. HPE has released security updates to address this and other critical vulnerabilities in their Access Points, urging users to enable cluster security and block access to specific UDP ports to mitigate the risk. Although these vulnerabilities have not been reported as exploited in the wild, they are attractive targets for threat actors, and there is a potential for exploitation of unpatched systems in the near future.",HP,"HP Aruba Networking Access Points, Instant Aos-8, And Aos-10",9.8,CRITICAL,0.0004299999854993075,false,true,false,true,,false,false,2024-11-05T22:34:31.648Z,0 CVE-2024-27460,https://securityvulnerability.io/vulnerability/CVE-2024-27460,Privilege Escalation Vulnerability Affects Plantronics Hub 3.25.1,"A privilege escalation vulnerability has been identified in the updater component of Plantronics Hub software versions 3.25.1 and earlier. This vulnerability could potentially allow attackers to elevate their permissions, thereby gaining unauthorized access to system resources and sensitive information. Organizations using affected versions are advised to implement appropriate security measures to mitigate the risk associated with this vulnerability.",HP,Plantronics Hub,,,0.0004299999854993075,false,false,false,true,true,false,false,2024-05-14T15:12:00.000Z,0 CVE-2024-26304,https://securityvulnerability.io/vulnerability/CVE-2024-26304,Buffer Overflow Vulnerability in PAPI Could Lead to Remote Code Execution,"A buffer overflow vulnerability exists within the L2/L3 Management service of Aruba Networks, which could permit unauthenticated remote code execution. By sending specially crafted packets to the PAPI (Public Access Point Interface) UDP port 8211, an attacker can exploit this vulnerability to execute arbitrary code with elevated privileges on the underlying operating system. This issue highlights the importance of securing access point management protocols to prevent unauthorized access and potential system compromise.",HP,Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; Wlan Gateways And Sd-wan Gateways Managed By Aruba Central,9.8,CRITICAL,0.0004299999854993075,false,false,false,true,true,false,false,2024-05-01T14:43:12.761Z,0