Vulnerabilites related to hpe - aruba_cx_6300f
cve-2021-41002
Vulnerability from cvelistv5
Published
2022-03-02 21:40
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
References
▼ | URL | Tags |
---|---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series |
Version: AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T02:59:31.058Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series", vendor: "n/a", versions: [ { status: "affected", version: "AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, ], problemTypes: [ { descriptions: [ { description: "Multiple authenticated remote path traversal", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-02T21:40:31", orgId: "eb103674-0d28-4225-80f8-39fb86215de0", shortName: "hpe", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-alert@hpe.com", ID: "CVE-2021-41002", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series", version: { version_data: [ { version_value: "AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Multiple authenticated remote path traversal", }, ], }, ], }, references: { reference_data: [ { name: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", refsource: "MISC", url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0", assignerShortName: "hpe", cveId: "CVE-2021-41002", datePublished: "2022-03-02T21:40:31", dateReserved: "2021-09-13T00:00:00", dateUpdated: "2024-08-04T02:59:31.058Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2002-20001
Vulnerability from cvelistv5
Published
2021-11-11 00:00
Modified
2025-02-13 16:27
Severity ?
EPSS score ?
Summary
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
References
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-08T04:06:55.288Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_transferred", ], url: "https://github.com/Balasys/dheater", }, { tags: [ "x_transferred", ], url: "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol", }, { tags: [ "x_transferred", ], url: "https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/", }, { tags: [ "x_transferred", ], url: "https://github.com/mozilla/ssl-config-generator/issues/162", }, { tags: [ "x_transferred", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf", }, { tags: [ "x_transferred", ], url: "https://www.suse.com/support/kb/doc/?id=000020510", }, { tags: [ "x_transferred", ], url: "https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/", }, { tags: [ "x_transferred", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, { tags: [ "x_transferred", ], url: "https://support.f5.com/csp/article/K83120834", }, { tags: [ "x_transferred", ], url: "https://dheatattack.com", }, { tags: [ "x_transferred", ], url: "https://gitlab.com/dheatattack/dheater", }, { tags: [ "x_transferred", ], url: "https://dheatattack.gitlab.io/", }, { tags: [ "x_transferred", ], url: "https://ieeexplore.ieee.org/document/10374117", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], descriptions: [ { lang: "en", value: "The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2024-04-23T06:51:09.585Z", orgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", shortName: "mitre", }, references: [ { url: "https://github.com/Balasys/dheater", }, { url: "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol", }, { url: "https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/", }, { url: "https://github.com/mozilla/ssl-config-generator/issues/162", }, { url: "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf", }, { url: "https://www.suse.com/support/kb/doc/?id=000020510", }, { url: "https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/", }, { url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, { url: "https://support.f5.com/csp/article/K83120834", }, { url: "https://dheatattack.com", }, { url: "https://gitlab.com/dheatattack/dheater", }, { url: "https://dheatattack.gitlab.io/", }, { url: "https://ieeexplore.ieee.org/document/10374117", }, ], }, }, cveMetadata: { assignerOrgId: "8254265b-2729-46b6-b9e3-3dfca2d5bfca", assignerShortName: "mitre", cveId: "CVE-2002-20001", datePublished: "2021-11-11T00:00:00.000Z", dateReserved: "2021-11-11T00:00:00.000Z", dateUpdated: "2025-02-13T16:27:06.803Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-41000
Vulnerability from cvelistv5
Published
2022-03-02 21:39
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Multiple authenticated remote code execution vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
References
▼ | URL | Tags |
---|---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series |
Version: AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T02:59:31.406Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series", vendor: "n/a", versions: [ { status: "affected", version: "AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple authenticated remote code execution vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, ], problemTypes: [ { descriptions: [ { description: "Multiple authenticated remote code execution", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-02T21:39:25", orgId: "eb103674-0d28-4225-80f8-39fb86215de0", shortName: "hpe", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-alert@hpe.com", ID: "CVE-2021-41000", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series", version: { version_data: [ { version_value: "AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple authenticated remote code execution vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Multiple authenticated remote code execution", }, ], }, ], }, references: { reference_data: [ { name: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", refsource: "MISC", url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0", assignerShortName: "hpe", cveId: "CVE-2021-41000", datePublished: "2022-03-02T21:39:25", dateReserved: "2021-09-13T00:00:00", dateUpdated: "2024-08-04T02:59:31.406Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-41001
Vulnerability from cvelistv5
Published
2022-03-02 21:38
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series |
Version: AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T02:59:30.299Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series", vendor: "n/a", versions: [ { status: "affected", version: "AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below", }, ], }, ], descriptions: [ { lang: "en", value: "An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.", }, ], problemTypes: [ { descriptions: [ { description: "Authenticated remote code execution", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-02T21:38:10", orgId: "eb103674-0d28-4225-80f8-39fb86215de0", shortName: "hpe", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-alert@hpe.com", ID: "CVE-2021-41001", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series", version: { version_data: [ { version_value: "AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Authenticated remote code execution", }, ], }, ], }, references: { reference_data: [ { name: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", refsource: "MISC", url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0", assignerShortName: "hpe", cveId: "CVE-2021-41001", datePublished: "2022-03-02T21:38:10", dateReserved: "2021-09-13T00:00:00", dateUpdated: "2024-08-04T02:59:30.299Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2021-41003
Vulnerability from cvelistv5
Published
2022-03-02 21:41
Modified
2024-08-04 02:59
Severity ?
EPSS score ?
Summary
Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
References
▼ | URL | Tags |
---|---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series |
Version: AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-04T02:59:30.997Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_MISC", "x_transferred", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series", vendor: "n/a", versions: [ { status: "affected", version: "AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below", }, ], }, ], descriptions: [ { lang: "en", value: "Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, ], problemTypes: [ { descriptions: [ { description: "Multiple unauthenticated command injection", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2022-03-02T21:41:42", orgId: "eb103674-0d28-4225-80f8-39fb86215de0", shortName: "hpe", }, references: [ { tags: [ "x_refsource_MISC", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "security-alert@hpe.com", ID: "CVE-2021-41003", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series", version: { version_data: [ { version_value: "AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "Multiple unauthenticated command injection", }, ], }, ], }, references: { reference_data: [ { name: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", refsource: "MISC", url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "eb103674-0d28-4225-80f8-39fb86215de0", assignerShortName: "hpe", cveId: "CVE-2021-41003", datePublished: "2022-03-02T21:41:42", dateReserved: "2021-09-13T00:00:00", dateUpdated: "2024-08-04T02:59:30.997Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
Vulnerability from fkie_nvd
Published
2022-03-02 22:15
Modified
2024-11-21 06:25
Severity ?
Summary
Multiple authenticated remote code execution vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | arubaos-cx | 10.08.0001 | |
hpe | aruba_8320 | - | |
hpe | aruba_8325-32-c | - | |
hpe | aruba_8325-48y8c | - | |
hpe | aruba_8360-12c | - | |
hpe | aruba_8360-16y2c | - | |
hpe | aruba_8360-24xf2c | - | |
hpe | aruba_8360-32y4c | - | |
hpe | aruba_8360-48xt4c | - | |
hpe | aruba_8400x | - | |
hpe | aruba_cx_6200f | - | |
hpe | aruba_cx_6300f | - | |
hpe | aruba_cx_6300m | - | |
hpe | aruba_cx_6405 | - | |
hpe | aruba_cx_6410 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "46EF92A4-497F-4E18-8EFB-CA65C6E13CBC", versionEndIncluding: "10.06.0170", versionStartIncluding: "10.06.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "08B891BD-6C2C-4D39-9851-857B908047E9", versionEndIncluding: "10.07.0020", versionStartIncluding: "10.07.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:10.08.0001:*:*:*:*:*:*:*", matchCriteriaId: "49148F3C-4D61-4F27-BA6F-5A27DE55B08F", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*", matchCriteriaId: "486BF5C3-870B-47B7-9C0E-9B35DBE3F41C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*", matchCriteriaId: "35AC85B2-4960-4F61-B4DB-02598AF6E2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*", matchCriteriaId: "535F4E94-337F-4EE7-8740-CFC5AF310736", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*", matchCriteriaId: "257C95D3-8D0F-4878-BC17-DC888975E07C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*", matchCriteriaId: "E2167087-2E82-4BD0-9791-C837B655A5EA", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*", matchCriteriaId: "9D8486D5-91D8-457D-BCED-6534768933ED", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "4362AA75-7C76-4741-934F-B0BF75A7DB9C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*", matchCriteriaId: "4801BD3A-ED8C-42F3-A631-3094A9A82913", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*", matchCriteriaId: "BB1FBA66-B639-4B0C-A96F-FC74B01B45BB", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD1A83B-109B-4596-AE37-706751E2B57D", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*", matchCriteriaId: "4D6F748F-89E9-45FB-8BE7-2201E5EB2755", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "8066A871-2683-4F74-9750-E73BF004209F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*", matchCriteriaId: "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*", matchCriteriaId: "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple authenticated remote code execution vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, { lang: "es", value: "Se han detectados múltiples vulnerabilidades de ejecución de código remota autenticado en la interfaz de línea de comandos de AOS-CX en las versiones de la serie de conmutadores Aruba CX 6200F, la serie de conmutadores Aruba 6300, la serie de conmutadores Aruba 6400, la serie de conmutadores Aruba 8320, la serie de conmutadores Aruba 8325, la serie de conmutadores Aruba 8400 y la serie de conmutadores Aruba CX 8360: AOS-CX versión 10.06.xxxx: 10.06.0170 y anteriores, AOS-CX versiones 10.07.xxxx: 10.07.0050 y anteriores, AOS-CX versiones 10.08.xxxx: 10.08.1030 y anteriores. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX que abordan estas vulnerabilidades de seguridad", }, ], id: "CVE-2021-41000", lastModified: "2024-11-21T06:25:14.377", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-02T22:15:08.017", references: [ { source: "security-alert@hpe.com", tags: [ "Vendor Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], sourceIdentifier: "security-alert@hpe.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2021-11-11 19:15
Modified
2024-11-20 23:42
Severity ?
Summary
The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:balasys:dheater:-:*:*:*:*:*:*:*", matchCriteriaId: "DE3F88FC-F039-433B-9035-88F1691DA082", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "065280B2-6EC1-4721-B3D7-EDE44ED4F5BD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", matchCriteriaId: "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:suse:linux_enterprise_server:11:-:*:*:*:*:*:*", matchCriteriaId: "F13F07CC-739B-465C-9184-0E9D708BD4C7", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_server:12:-:*:*:*:*:*:*", matchCriteriaId: "15FC9014-BD85-4382-9D04-C0703E901D7A", vulnerable: true, }, { criteria: "cpe:2.3:o:suse:linux_enterprise_server:15:*:*:*:*:*:*:*", matchCriteriaId: "70A029CD-2AC4-4877-B1A4-5C72B351BA27", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "CE73DAA2-9CCA-4BD6-B11A-9326F79D9ABB", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_firewall_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "475E283C-8F3C-4051-B9E8-349845F8C528", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_advanced_web_application_firewall:*:*:*:*:*:*:*:*", matchCriteriaId: "956AC9F3-2042-4C21-A5E4-D2D4334D2FC3", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_analytics:*:*:*:*:*:*:*:*", matchCriteriaId: "E17DBD3E-F5AC-4A35-81E0-C4804CAD78F9", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_acceleration_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "346B71B1-D583-4463-ADF8-BEE700B0CA3A", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_security_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "B2AA25BA-72C5-48A9-BDBC-CA108208011F", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_application_visibility_and_reporting:*:*:*:*:*:*:*:*", matchCriteriaId: "308B0070-6716-4754-A5E4-C3D70CAB376B", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_carrier-grade_nat:*:*:*:*:*:*:*:*", matchCriteriaId: "8F26AB06-7FEB-4A56-B722-DBDEEE628DB8", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_ddos_hybrid_defender:*:*:*:*:*:*:*:*", matchCriteriaId: "EE48C9C9-6B84-4A4A-963D-6DFE0C2FB312", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_domain_name_system:*:*:*:*:*:*:*:*", matchCriteriaId: "878CD8E6-6B9B-431D-BD15-F954C7B8076F", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_edge_gateway:*:*:*:*:*:*:*:*", matchCriteriaId: "4D9DB9B9-2959-448E-9B59-C873584A0E11", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_fraud_protection_service:*:*:*:*:*:*:*:*", matchCriteriaId: "6AF04191-019B-4BC9-A9A7-7B7AA9B5B7D1", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_global_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "F62D754D-A4A1-4093-AB42-9F51C19976CA", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_link_controller:*:*:*:*:*:*:*:*", matchCriteriaId: "90084CD6-FA4B-4305-BC65-58237BAF714E", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_local_traffic_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "BC9D4626-915F-42E5-81E0-6F8271084773", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*", matchCriteriaId: "7056F1FA-24AC-4D9F-8DDC-B3CA4740BF5E", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_service_proxy:1.6.0:*:*:*:*:kubernetes:*:*", matchCriteriaId: "BC5AC8C7-92BA-48D4-81A1-F5323DA952A9", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_ssl_orchestrator:*:*:*:*:*:*:*:*", matchCriteriaId: "E48AC50D-19B3-4E97-ADD2-B661BD891ED7", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_webaccelerator:*:*:*:*:*:*:*:*", matchCriteriaId: "B13C4244-BE15-4F2C-BBBA-35072571B041", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-ip_websafe:*:*:*:*:*:*:*:*", matchCriteriaId: "C1B4FBF6-C23A-4BD2-ADFB-9617C03B603A", versionEndIncluding: "17.1.0", versionStartIncluding: "13.1.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-iq_centralized_management:*:*:*:*:*:*:*:*", matchCriteriaId: "360D8842-2C55-450F-9AFA-09CA34B12598", versionEndIncluding: "8.2.0", versionStartIncluding: "8.0.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:big-iq_centralized_management:7.1.0:*:*:*:*:*:*:*", matchCriteriaId: "DA0B396A-B5CE-4337-A33A-EF58C4589CB3", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:f5os-a:1.3.0:*:*:*:*:*:*:*", matchCriteriaId: "C4A3C86A-CA2F-4AC8-A43E-765829A96147", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:f5os-a:1.3.1:*:*:*:*:*:*:*", matchCriteriaId: "03E01235-F9B0-4CCF-AA08-FECF61C62B21", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:f5os-c:*:*:*:*:*:*:*:*", matchCriteriaId: "3BFAE8EC-9A5F-421D-990D-B6D454DECAEC", versionEndIncluding: "1.3.2", versionStartIncluding: "1.3.0", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:f5os-c:1.5.0:*:*:*:*:*:*:*", matchCriteriaId: "BC3EDB8D-5C16-49DF-BE48-C83744AD7788", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:f5os-c:1.5.1:*:*:*:*:*:*:*", matchCriteriaId: "12FEEABD-9A4A-4A33-9B74-7B053352C47D", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.1.0:*:*:*:*:*:*:*", matchCriteriaId: "42836A1C-81BB-4F80-9E32-EEE0DAA18D26", vulnerable: true, }, { criteria: "cpe:2.3:a:f5:traffix_signaling_delivery_controller:5.2.0:*:*:*:*:*:*:*", matchCriteriaId: "DA4D5EC6-8099-4D0A-AD6F-BA3B37C2EBD8", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "3B3AD582-9909-4FF5-B541-571F18E22356", versionEndExcluding: "10.06.0180", versionStartIncluding: "10.06.0000", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "21F81EB2-3916-4DC6-9600-B7FD17906B53", versionEndExcluding: "10.07.0030", versionStartIncluding: "10.07.0000", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "71284AA8-9E0E-4B2F-8464-B49E1D6965B5", versionEndExcluding: "10.08.0010", versionStartIncluding: "10.08.0000", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "F059E5A9-E613-4BE1-BF61-C477B3441175", versionEndExcluding: "10.09.0002", versionStartIncluding: "10.09.0000", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hpe:aruba_cx_4100i:-:*:*:*:*:*:*:*", matchCriteriaId: "B7C2B56C-203F-4290-BCE7-8BD751DF9CEF", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6100:-:*:*:*:*:*:*:*", matchCriteriaId: "FF1DD310-3D31-4204-92E0-70C33EE44F08", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD1A83B-109B-4596-AE37-706751E2B57D", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6200m:-:*:*:*:*:*:*:*", matchCriteriaId: "1218AAA5-01ED-4D89-A7AE-A600356ABD46", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*", matchCriteriaId: "4D6F748F-89E9-45FB-8BE7-2201E5EB2755", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "8066A871-2683-4F74-9750-E73BF004209F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*", matchCriteriaId: "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*", matchCriteriaId: "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8320:-:*:*:*:*:*:*:*", matchCriteriaId: "10B5F18A-28B0-49B4-8374-C681C2B48D2A", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8325-32c:-:*:*:*:*:*:*:*", matchCriteriaId: "59B7E2D3-0B72-4A78-AEFA-F106FAD38156", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8325-48y8c:-:*:*:*:*:*:*:*", matchCriteriaId: "7E87A92B-4EE5-4235-A0DA-195F27841DBB", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8360-12c:-:*:*:*:*:*:*:*", matchCriteriaId: "6BC24E52-13C0-402F-9ABF-A1DE51719AEF", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8360-16y2c:-:*:*:*:*:*:*:*", matchCriteriaId: "76EF979E-061A-42A3-B161-B835E92ED180", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8360-24xf2c:-:*:*:*:*:*:*:*", matchCriteriaId: "DE04919C-9289-4FB3-938F-F8BB15EC6A74", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8360-32y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "B630C64B-C474-477D-A80B-A0FB73ACCC49", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8360-48xt4c:-:*:*:*:*:*:*:*", matchCriteriaId: "53ABE8B8-A4F6-400B-A893-314BE24D06B8", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8360-48y6c:-:*:*:*:*:*:*:*", matchCriteriaId: "C44383CC-3751-455E-B1AB-39B16F40DC76", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_8400:-:*:*:*:*:*:*:*", matchCriteriaId: "B25A9CD2-5E5F-4BDB-8707-5D6941411A2B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:a:stormshield:stormshield_management_center:*:*:*:*:*:*:*:*", matchCriteriaId: "62A933C5-C56E-485C-AD49-3B6A2C329131", versionEndExcluding: "3.3.3", vulnerable: true, }, { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "F7387F52-013D-432D-87D8-5D3ABD472C9E", versionEndExcluding: "4.3.16", versionStartIncluding: "2.7.0", vulnerable: true, }, { criteria: "cpe:2.3:a:stormshield:stormshield_network_security:*:*:*:*:*:*:*:*", matchCriteriaId: "C8A23A5D-928A-4225-9C93-31E5DFE215A7", versionEndExcluding: "4.6.3", versionStartIncluding: "4.4.0", vulnerable: true, }, ], negate: false, operator: "OR", }, ], }, ], cveTags: [], descriptions: [ { lang: "en", value: "The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)at or D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The attack may be more disruptive in cases where a client can require a server to select its largest supported key size. The basic attack scenario is that the client must claim that it can only communicate with DHE, and the server must be configured to allow DHE.", }, { lang: "es", value: "El Protocolo de Acuerdo de Claves Diffie-Hellman permite a atacantes remotos (del lado del cliente) enviar números arbitrarios que en realidad no son claves públicas, y desencadenar costosos cálculos de exponenciación modular DHE del lado del servidor, también se conoce como un ataque D(HE)ater. El cliente necesita muy pocos recursos de CPU y ancho de banda de red. El ataque puede ser más perturbador en los casos en los que un cliente puede exigir al servidor que seleccione su mayor tamaño de clave soportado. El escenario básico del ataque es que el cliente debe afirmar que sólo puede comunicarse con DHE, y el servidor debe estar configurado para permitir DHE", }, ], id: "CVE-2002-20001", lastModified: "2024-11-20T23:42:37.617", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2021-11-11T19:15:07.380", references: [ { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://dheatattack.com", }, { source: "cve@mitre.org", url: "https://dheatattack.gitlab.io/", }, { source: "cve@mitre.org", tags: [ "Product", ], url: "https://github.com/Balasys/dheater", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", ], url: "https://github.com/mozilla/ssl-config-generator/issues/162", }, { source: "cve@mitre.org", url: "https://gitlab.com/dheatattack/dheater", }, { source: "cve@mitre.org", url: "https://ieeexplore.ieee.org/document/10374117", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K83120834", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/", }, { source: "cve@mitre.org", tags: [ "Issue Tracking", ], url: "https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/", }, { source: "cve@mitre.org", tags: [ "Exploit", "Technical Description", ], url: "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol", }, { source: "cve@mitre.org", tags: [ "Third Party Advisory", ], url: "https://www.suse.com/support/kb/doc/?id=000020510", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://dheatattack.com", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://dheatattack.gitlab.io/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Product", ], url: "https://github.com/Balasys/dheater", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", ], url: "https://github.com/mozilla/ssl-config-generator/issues/162", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://gitlab.com/dheatattack/dheater", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://ieeexplore.ieee.org/document/10374117", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://support.f5.com/csp/article/K83120834", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.openssl.org/blog/blog/2022/10/21/tls-groups-configuration/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Issue Tracking", ], url: "https://www.reddit.com/r/netsec/comments/qdoosy/server_overload_by_enforcing_dhe_key_exchange/", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Exploit", "Technical Description", ], url: "https://www.researchgate.net/profile/Anton-Stiglic-2/publication/2401745_Security_Issues_in_the_Diffie-Hellman_Key_Agreement_Protocol", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", ], url: "https://www.suse.com/support/kb/doc/?id=000020510", }, ], sourceIdentifier: "cve@mitre.org", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-400", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-03-02 22:15
Modified
2024-11-21 06:25
Severity ?
Summary
An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | aruba_8320 | - | |
hpe | aruba_8325-32-c | - | |
hpe | aruba_8325-48y8c | - | |
hpe | aruba_8360-12c | - | |
hpe | aruba_8360-16y2c | - | |
hpe | aruba_8360-24xf2c | - | |
hpe | aruba_8360-32y4c | - | |
hpe | aruba_8360-48xt4c | - | |
hpe | aruba_8400x | - | |
hpe | aruba_cx_6200f | - | |
hpe | aruba_cx_6300f | - | |
hpe | aruba_cx_6300m | - | |
hpe | aruba_cx_6405 | - | |
hpe | aruba_cx_6410 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "3F9AB6C6-F5B1-462C-9225-4329C126D7AB", versionEndIncluding: "10.07.0050", versionStartIncluding: "10.07.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "64D93409-2CFC-45B4-852F-3A8CD24E8EF6", versionEndIncluding: "10.08.1030", versionStartIncluding: "10.08.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "6A6004E2-4C71-469F-9C40-470040E053C3", versionEndIncluding: "10.09.0002", versionStartIncluding: "10.09.0001", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*", matchCriteriaId: "486BF5C3-870B-47B7-9C0E-9B35DBE3F41C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*", matchCriteriaId: "35AC85B2-4960-4F61-B4DB-02598AF6E2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*", matchCriteriaId: "535F4E94-337F-4EE7-8740-CFC5AF310736", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*", matchCriteriaId: "257C95D3-8D0F-4878-BC17-DC888975E07C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*", matchCriteriaId: "E2167087-2E82-4BD0-9791-C837B655A5EA", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*", matchCriteriaId: "9D8486D5-91D8-457D-BCED-6534768933ED", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "4362AA75-7C76-4741-934F-B0BF75A7DB9C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*", matchCriteriaId: "4801BD3A-ED8C-42F3-A631-3094A9A82913", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*", matchCriteriaId: "BB1FBA66-B639-4B0C-A96F-FC74B01B45BB", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD1A83B-109B-4596-AE37-706751E2B57D", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*", matchCriteriaId: "4D6F748F-89E9-45FB-8BE7-2201E5EB2755", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "8066A871-2683-4F74-9750-E73BF004209F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*", matchCriteriaId: "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*", matchCriteriaId: "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "An authenticated remote code execution vulnerability was discovered in the AOS-CX Network Analytics Engine (NAE) in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address this security vulnerability.", }, { lang: "es", value: "Se ha detectado una vulnerabilidad de ejecución de código remoto autenticado en el motor de análisis de red (NAE) de AOS-CX en las versiones de la serie de conmutadores Aruba CX 6200F, la serie de conmutadores Aruba 6300, la serie de conmutadores Aruba 6400, la serie de conmutadores Aruba 8320, la serie de conmutadores Aruba 8325, la serie de conmutadores Aruba 8400 y la serie de conmutadores Aruba CX 8360: AOS-CX versiones 10.07.xxxx: 10.07.0050 y anteriores, AOS-CX versiones 10.08.xxxx: 10.08.1030 y anteriores, AOS-CX versiones 10.09.xxxx: 10.09.0002 y anteriores. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX que abordan esta vulnerabilidad de seguridad", }, ], id: "CVE-2021-41001", lastModified: "2024-11-21T06:25:14.530", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 9, confidentialityImpact: "COMPLETE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:C/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 10, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.8, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.9, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-02T22:15:08.067", references: [ { source: "security-alert@hpe.com", tags: [ "Vendor Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], sourceIdentifier: "security-alert@hpe.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-77", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-03-02 22:15
Modified
2024-11-21 06:25
Severity ?
Summary
Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | aruba_8320 | - | |
hpe | aruba_8325-32-c | - | |
hpe | aruba_8325-48y8c | - | |
hpe | aruba_8360-12c | - | |
hpe | aruba_8360-16y2c | - | |
hpe | aruba_8360-24xf2c | - | |
hpe | aruba_8360-32y4c | - | |
hpe | aruba_8360-48xt4c | - | |
hpe | aruba_8400x | - | |
hpe | aruba_cx_6200f | - | |
hpe | aruba_cx_6300f | - | |
hpe | aruba_cx_6300m | - | |
hpe | aruba_cx_6405 | - | |
hpe | aruba_cx_6410 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "46EF92A4-497F-4E18-8EFB-CA65C6E13CBC", versionEndIncluding: "10.06.0170", versionStartIncluding: "10.06.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "3F9AB6C6-F5B1-462C-9225-4329C126D7AB", versionEndIncluding: "10.07.0050", versionStartIncluding: "10.07.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "64D93409-2CFC-45B4-852F-3A8CD24E8EF6", versionEndIncluding: "10.08.1030", versionStartIncluding: "10.08.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "6A6004E2-4C71-469F-9C40-470040E053C3", versionEndIncluding: "10.09.0002", versionStartIncluding: "10.09.0001", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*", matchCriteriaId: "486BF5C3-870B-47B7-9C0E-9B35DBE3F41C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*", matchCriteriaId: "35AC85B2-4960-4F61-B4DB-02598AF6E2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*", matchCriteriaId: "535F4E94-337F-4EE7-8740-CFC5AF310736", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*", matchCriteriaId: "257C95D3-8D0F-4878-BC17-DC888975E07C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*", matchCriteriaId: "E2167087-2E82-4BD0-9791-C837B655A5EA", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*", matchCriteriaId: "9D8486D5-91D8-457D-BCED-6534768933ED", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "4362AA75-7C76-4741-934F-B0BF75A7DB9C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*", matchCriteriaId: "4801BD3A-ED8C-42F3-A631-3094A9A82913", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*", matchCriteriaId: "BB1FBA66-B639-4B0C-A96F-FC74B01B45BB", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD1A83B-109B-4596-AE37-706751E2B57D", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*", matchCriteriaId: "4D6F748F-89E9-45FB-8BE7-2201E5EB2755", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "8066A871-2683-4F74-9750-E73BF004209F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*", matchCriteriaId: "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*", matchCriteriaId: "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple authenticated remote path traversal vulnerabilities were discovered in the AOS-CX command line interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, { lang: "es", value: "Se han detectado múltiples vulnerabilidades de salto de ruta remoto autenticadas en la interfaz de línea de comandos de AOS-CX en las versiones de la serie de conmutadores Aruba CX 6200F, la serie de conmutadores Aruba 6300, la serie de conmutadores Aruba 6400, la serie de conmutadores Aruba 8320, la serie de conmutadores Aruba 8325, la serie de conmutadores Aruba 8400 y la serie de conmutadores Aruba CX 8360: AOS-CX versiones 10.06.xxxx: 10.06.0170 y anteriores, AOS-CX versiones 10.07.xxxx: 10.07.0050 y anteriores, AOS-CX versiones 10.08.xxxx: 10.08.1030 y anteriores, AOS-CX versiones 10.09.xxxx: 10.09.0002 y anteriores. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX que abordan estas vulnerabilidades de seguridad", }, ], id: "CVE-2021-41002", lastModified: "2024-11-21T06:25:14.673", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "HIGH", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "SINGLE", availabilityImpact: "COMPLETE", baseScore: 8.5, confidentialityImpact: "NONE", integrityImpact: "COMPLETE", vectorString: "AV:N/AC:L/Au:S/C:N/I:C/A:C", version: "2.0", }, exploitabilityScore: 8, impactScore: 9.2, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 8.1, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "HIGH", privilegesRequired: "LOW", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 5.2, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-02T22:15:08.113", references: [ { source: "security-alert@hpe.com", tags: [ "Vendor Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], sourceIdentifier: "security-alert@hpe.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-22", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2022-03-02 22:15
Modified
2024-11-21 06:25
Severity ?
Summary
Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | arubaos-cx | * | |
hpe | aruba_8320 | - | |
hpe | aruba_8325-32-c | - | |
hpe | aruba_8325-48y8c | - | |
hpe | aruba_8360-12c | - | |
hpe | aruba_8360-16y2c | - | |
hpe | aruba_8360-24xf2c | - | |
hpe | aruba_8360-32y4c | - | |
hpe | aruba_8360-48xt4c | - | |
hpe | aruba_8400x | - | |
hpe | aruba_cx_6200f | - | |
hpe | aruba_cx_6300f | - | |
hpe | aruba_cx_6300m | - | |
hpe | aruba_cx_6405 | - | |
hpe | aruba_cx_6410 | - |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "46EF92A4-497F-4E18-8EFB-CA65C6E13CBC", versionEndIncluding: "10.06.0170", versionStartIncluding: "10.06.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "3F9AB6C6-F5B1-462C-9225-4329C126D7AB", versionEndIncluding: "10.07.0050", versionStartIncluding: "10.07.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "64D93409-2CFC-45B4-852F-3A8CD24E8EF6", versionEndIncluding: "10.08.1030", versionStartIncluding: "10.08.0001", vulnerable: true, }, { criteria: "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*", matchCriteriaId: "6A6004E2-4C71-469F-9C40-470040E053C3", versionEndIncluding: "10.09.0002", versionStartIncluding: "10.09.0001", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:hpe:aruba_8320:-:*:*:*:*:*:*:*", matchCriteriaId: "486BF5C3-870B-47B7-9C0E-9B35DBE3F41C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8325-32-c:-:*:*:*:*:*:*:*", matchCriteriaId: "35AC85B2-4960-4F61-B4DB-02598AF6E2E6", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8325-48y8c:-:*:*:*:*:*:*:*", matchCriteriaId: "535F4E94-337F-4EE7-8740-CFC5AF310736", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-12c:-:*:*:*:*:*:*:*", matchCriteriaId: "257C95D3-8D0F-4878-BC17-DC888975E07C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-16y2c:-:*:*:*:*:*:*:*", matchCriteriaId: "E2167087-2E82-4BD0-9791-C837B655A5EA", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-24xf2c:-:*:*:*:*:*:*:*", matchCriteriaId: "9D8486D5-91D8-457D-BCED-6534768933ED", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-32y4c:-:*:*:*:*:*:*:*", matchCriteriaId: "4362AA75-7C76-4741-934F-B0BF75A7DB9C", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8360-48xt4c:-:*:*:*:*:*:*:*", matchCriteriaId: "4801BD3A-ED8C-42F3-A631-3094A9A82913", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_8400x:-:*:*:*:*:*:*:*", matchCriteriaId: "BB1FBA66-B639-4B0C-A96F-FC74B01B45BB", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*", matchCriteriaId: "FCD1A83B-109B-4596-AE37-706751E2B57D", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300f:-:*:*:*:*:*:*:*", matchCriteriaId: "4D6F748F-89E9-45FB-8BE7-2201E5EB2755", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6300m:-:*:*:*:*:*:*:*", matchCriteriaId: "8066A871-2683-4F74-9750-E73BF004209F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*", matchCriteriaId: "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F", vulnerable: false, }, { criteria: "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*", matchCriteriaId: "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Multiple unauthenticated command injection vulnerabilities were discovered in the AOS-CX API interface in Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series version(s): AOS-CX 10.06.xxxx: 10.06.0170 and below, AOS-CX 10.07.xxxx: 10.07.0050 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.09.xxxx: 10.09.0002 and below. Aruba has released upgrades for Aruba AOS-CX devices that address these security vulnerabilities.", }, { lang: "es", value: "Se han detectado múltiples vulnerabilidades de inyección de comandos sin autenticación en la interfaz API de AOS-CX en las versiones de Aruba CX 6200F Switch Series, Aruba 6300 Switch Series, Aruba 6400 Switch Series, Aruba 8320 Switch Series, Aruba 8325 Switch Series, Aruba 8400 Switch Series, Aruba CX 8360 Switch Series: AOS-CX versiones 10.06.xxxx: 10.06.0170 y anteriores, AOS-CX versiones 10.07.xxxx: 10.07.0050 y anteriores, AOS-CX versiones 10.08.xxxx: 10.08.1030 y anteriores, AOS-CX versiones 10.09.xxxx: 10.09.0002 y anteriores. Aruba ha publicado actualizaciones para los dispositivos Aruba AOS-CX que abordan estas vulnerabilidades de seguridad", }, ], id: "CVE-2021-41003", lastModified: "2024-11-21T06:25:14.830", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "MEDIUM", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 4.3, confidentialityImpact: "NONE", integrityImpact: "PARTIAL", vectorString: "AV:N/AC:M/Au:N/C:N/I:P/A:N", version: "2.0", }, exploitabilityScore: 8.6, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: true, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 6.1, baseSeverity: "MEDIUM", confidentialityImpact: "LOW", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "REQUIRED", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 2.7, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-03-02T22:15:08.157", references: [ { source: "security-alert@hpe.com", tags: [ "Vendor Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-004.txt", }, ], sourceIdentifier: "security-alert@hpe.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }