{"vulnerability": "CVE-2024-2630", "sightings": [{"uuid": "2a14b9f8-94e8-498a-97e0-29d73d373011", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26306", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-24-319-06", "content": "", "creation_timestamp": "2024-11-14T12:00:00.000000Z"}, {"uuid": "e35a4966-0e54-4cb1-80b7-7110c3827bed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://www.cert.at/de/warnungen/2024/5/kritische-sicherheitslucken-in-arubaos-updates-verfugbar", "content": "", "creation_timestamp": "2024-05-02T09:46:45.000000Z"}, {"uuid": "0d052c98-c6a3-4a3d-a897-3aa7c90b62a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26306", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-09", "content": "", "creation_timestamp": "2025-02-13T11:00:00.000000Z"}, {"uuid": "04b0140d-fba4-420f-8746-fbc79ef2e1bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26306", "type": "seen", "source": "Telegram/aKKiL3esHrFiHNKCdzrNAY9xQXHJnjFWbXbap8E1C0GpPdAQ", "content": "", "creation_timestamp": "2025-03-02T11:44:22.000000Z"}, {"uuid": "3e9314ff-adf2-4b66-8cbf-69e02d148a82", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26305", "type": "seen", "source": "https://www.cert.at/de/warnungen/2024/5/kritische-sicherheitslucken-in-arubaos-updates-verfugbar", "content": "", "creation_timestamp": "2024-05-02T09:46:45.000000Z"}, {"uuid": "09f7a828-d578-409c-862a-21a21afb7dd9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26306", "type": "seen", "source": "https://gist.github.com/Darkcrai86/df2ae6ae38b8098f12ea3b4c36b27368", "content": "", "creation_timestamp": "2026-01-21T13:08:03.000000Z"}, {"uuid": "fb847a04-90db-44dd-814b-88075ea5b0bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26308", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8234", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aDocker Deskop giving issue CVE-2024-26308 for maven [reproduce]\nURL\uff1ahttps://github.com/crazycatMyopic/cve\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-11T14:13:53.000000Z"}, {"uuid": "e90817b1-3d22-45ac-b2dd-d8c3370e3920", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7210", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCritical RCE Vulnerabilities in HPE Aruba Devices (may 2024)\nURL\uff1ahttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-05-04T10:14:32.000000Z"}, {"uuid": "c60b9330-441f-4016-9398-ed97418e1b0e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8681", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS\nURL\uff1ahttps://github.com/X-Projetion/CVE-2024-26304-RCE-exploit\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-10-05T01:42:45.000000Z"}, {"uuid": "e06fc241-6c9b-4ffc-a437-5682cc0a22a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "Telegram/HVh7Vx_8Pxozw0XFE4u9l-sjC-DtBX2SBytfzSHOTwEV1zs", "content": "", "creation_timestamp": "2024-05-03T07:24:45.000000Z"}, {"uuid": "eb61cdbd-df52-4e71-8012-c7ce53ac15e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26306", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/5891", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26306\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: iPerf3 before 3.17, when used with OpenSSL before 3.2.0 as a server with RSA authentication, allows a timing side channel in RSA decryption operations. This side channel could be sufficient for an attacker to recover credential plaintext. It requires the attacker to send a large number of messages for decryption, as described in \"Everlasting ROBOT: the Marvin Attack\" by Hubert Kario.\n\ud83d\udccf Published: 2024-05-13T00:00:00.000Z\n\ud83d\udccf Modified: 2025-02-28T13:07:28.637Z\n\ud83d\udd17 References:\n1. https://github.com/esnet/iperf/releases/tag/3.17\n2. https://downloads.es.net/pub/iperf/esnet-secadv-2024-0001.txt.asc\n3. https://www.insyde.com/security-pledge/SA-2024005", "creation_timestamp": "2025-02-28T13:26:56.000000Z"}, {"uuid": "864ca96c-1623-421d-aff4-f5d852ed01cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26308", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9180", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26308\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.21 before 1.26.\n\nUsers are recommended to upgrade to version 1.26, which fixes the issue.\n\ud83d\udccf Published: 2024-02-19T08:31:50.192Z\n\ud83d\udccf Modified: 2025-03-27T19:10:43.565Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/ch5yo2d21p7vlqrhll9b17otbyq4npfg\n2. http://www.openwall.com/lists/oss-security/2024/02/19/2\n3. https://security.netapp.com/advisory/ntap-20240307-0009/", "creation_timestamp": "2025-03-27T19:26:53.000000Z"}, {"uuid": "0e69e51e-dcba-4315-9ae3-3701b8f3a327", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26309", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/8905", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-26309\n\ud83d\udd25 CVSS Score: 5.3 (cvssV3_1, Vector: CVSS:3.1/AC:L/AV:N/A:N/C:L/I:N/PR:N/S:U/UI:N)\n\ud83d\udd39 Description: Archer Platform 6.x before 6.14 P2 HF2 (6.14.0.2.2) contains a sensitive information disclosure vulnerability. An unauthenticated attacker could potentially obtain access to sensitive information via an internal URL.\n\ud83d\udccf Published: 2024-03-08T00:00:00.000Z\n\ud83d\udccf Modified: 2025-03-26T16:32:47.142Z\n\ud83d\udd17 References:\n1. https://archerirm.com\n2. https://www.archerirm.community/t5/platform-announcements/archer-update-for-multiple-vulnerabilities/ta-p/717102", "creation_timestamp": "2025-03-26T17:25:32.000000Z"}, {"uuid": "949e6f7b-9550-43e6-8b9a-21e0e229106b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "Telegram/617isV9DWDaecD5DhruuT2oO0A7CuI80HPoCIlb3qp8V7w", "content": "", "creation_timestamp": "2024-10-05T15:19:46.000000Z"}, {"uuid": "cc65214d-4f19-4832-924b-530c00224464", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/1793", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-08T16:16:11.000000Z"}, {"uuid": "6809a469-385f-4dfc-8054-9afd31ecb107", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/2173", "content": "https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits\n\nCritical RCE Vulnerabilities in HPE Aruba Devices (may 2024)\n#github #exploit", "creation_timestamp": "2024-10-05T14:15:24.000000Z"}, {"uuid": "bab91cd4-2fdd-49a2-a348-f79f1b4d4c7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "Telegram/vGITFBuYOY6b2kqFTfQRnZw6GZXPc1CchSQCXTIDmInvWg", "content": "", "creation_timestamp": "2024-05-03T07:56:39.000000Z"}, {"uuid": "2dd6030e-fdac-421f-9231-9f3e748b3883", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/ton618cyber/5254", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-08T16:16:08.000000Z"}, {"uuid": "15c6b4a3-a17f-4200-b82e-becd45bd3996", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/ZeroEthical_Course/1652", "content": "CVE-2024-26304 RCE-exploit\n*\nHPE Aruba Device\n*\nusage:\npython3 CVE-2024-26304.py -u http://127.0.0.1", "creation_timestamp": "2024-10-04T23:34:23.000000Z"}, {"uuid": "180e2a24-d549-4c5a-b9e5-25c8ecb2c1f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/realLulzSec/19219", "content": "https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits\n\nCritical RCE Vulnerabilities in HPE Aruba Devices (may 2024)\n#github #exploit", "creation_timestamp": "2024-10-05T14:15:24.000000Z"}, {"uuid": "3a5a9b6a-d5ab-4359-aeb7-d4bdf79bda4e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/6818", "content": "The Hacker News\nFour Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks\n\nHPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems.\nOf the&nbsp;10&nbsp;security defects, four are rated critical in severity -\n\nCVE-2024-26304&nbsp;(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via", "creation_timestamp": "2024-05-03T07:56:40.000000Z"}, {"uuid": "05384c98-1383-4fcd-9e77-582223c5649a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "Telegram/bUW83q2BaozOWvsBXtebtZUIutlySf2YSDxMjfMMk1oaIQ", "content": "", "creation_timestamp": "2024-05-03T08:17:04.000000Z"}, {"uuid": "44760c66-b7e4-4c8a-a687-c354cf4a70cc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-2630", "type": "seen", "source": "https://t.me/arpsyndicate/4422", "content": "#ExploitObserverAlert\n\nCVE-2024-2630\n\nDESCRIPTION: Exploit Observer has 128 entries in 17 file formats related to CVE-2024-2630. Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)\n\nFIRST-EPSS: 0.000450000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2024-04-09T21:00:14.000000Z"}, {"uuid": "fb6a8964-c1b8-4cb1-afdb-79b59e84a0a5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26308", "type": "seen", "source": "https://t.me/arpsyndicate/3546", "content": "#ExploitObserverAlert\n\nCVE-2024-26308\n\nDESCRIPTION: Exploit Observer has 1 entries in 1 file formats related to CVE-2024-26308. Allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.21 before 1.26.  Users are recommended to upgrade to version 1.26, which fixes the issue.", "creation_timestamp": "2024-02-20T05:17:32.000000Z"}, {"uuid": "eb0fc941-f4a8-455e-b05b-40db04194877", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26308", "type": "seen", "source": "https://t.me/arpsyndicate/4570", "content": "#ExploitObserverAlert\n\nCVE-2024-26308\n\nDESCRIPTION: Exploit Observer has 13 entries in 3 file formats related to CVE-2024-26308. Allocation of Resources Without Limits or Throttling vulnerability in Apache Commons Compress.This issue affects Apache Commons Compress: from 1.21 before 1.26.  Users are recommended to upgrade to version 1.26, which fixes the issue.\n\nFIRST-EPSS: 0.000610000\nNVD-IS: 3.6\nNVD-ES: 1.8\nARPS-EXPLOITABILITY: 0.6377505", "creation_timestamp": "2024-04-12T08:55:35.000000Z"}, {"uuid": "1390ddad-5cc6-4168-b681-c56aa4bed2ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://t.me/tengkorakcybercrewz/1268", "content": "The Hacker News\nFour Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks\n\nHPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems.\nOf the&nbsp;10&nbsp;security defects, four are rated critical in severity -\n\nCVE-2024-26304&nbsp;(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via", "creation_timestamp": "2024-05-03T07:56:40.000000Z"}, {"uuid": "87830a8b-74e6-456d-9c04-412c61b5ae79", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2292", "content": "CVE-2024-26304 RCE-exploit\n*\nHPE Aruba Device\n*\nusage:\npython3 CVE-2024-26304.py -u http://127.0.0.1", "creation_timestamp": "2024-10-04T22:36:05.000000Z"}, {"uuid": "14124c00-1dd8-4a56-89bb-8d7908e14f36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://t.me/KomunitiSiber/1885", "content": "Four Critical Vulnerabilities Expose HPE Aruba Devices to RCE Attacks\nhttps://thehackernews.com/2024/05/four-critical-vulnerabilities-expose.html\n\nHPE Aruba Networking (formerly Aruba Networks) has released security updates to address critical flaws impacting ArubaOS that could result in remote code execution (RCE) on affected systems.\nOf the\u00a010\u00a0security defects, four are rated critical in severity -\n\nCVE-2024-26304\u00a0(CVSS score: 9.8) - Unauthenticated Buffer Overflow Vulnerability in the L2/L3 Management Service Accessed via", "creation_timestamp": "2024-05-03T07:46:48.000000Z"}, {"uuid": "9343ece7-9000-439e-9dca-98c5ef570f9a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26301", "type": "seen", "source": "https://t.me/ctinow/194990", "content": "https://ift.tt/q0gwdWA\nCVE-2024-26301", "creation_timestamp": "2024-02-28T00:26:24.000000Z"}, {"uuid": "ce56d420-3a51-4039-b593-2fc6ca4a8a27", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26308", "type": "seen", "source": "https://t.me/ctinow/202627", "content": "https://ift.tt/YuD68nt\nCVE-2024-26308 Apache Commons Compress Vulnerability in NetApp Products", "creation_timestamp": "2024-03-07T18:32:25.000000Z"}, {"uuid": "a14d39b2-95e7-4202-993e-c748ebe437e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26305", "type": "seen", "source": "https://t.me/true_secator/5691", "content": "HPE Aruba Networking \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0447\u0435\u0442\u044b\u0440\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u041e\u0421 ArubaOS \u0441 \u043e\u0446\u0435\u043d\u043a\u043e\u0439 CVSS v3.1: 9.8.\n\n\u0412\u0441\u0435 \u043e\u043d\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 HPE Aruba Networking Mobility Conductor, \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u044b, \u0448\u043b\u044e\u0437\u044b WLAN \u0438 \u0448\u043b\u044e\u0437\u044b SD-WAN, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0435 Aruba Central, ArubaOS 10.5.1.0 \u0438 \u043d\u0438\u0436\u0435, 10.4.1.0 \u0438 \u0441\u0442\u0430\u0440\u0448\u0435, 8.11.2.1 \u0438 \u043d\u0438\u0436\u0435, 8.10.0.10 \u0438 \u0441\u0442\u0430\u0440\u0448\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 ArubaOS \u0438 SD-WAN, \u0434\u043e\u0441\u0442\u0438\u0433\u0448\u0438\u0435 EoL.\n\n\u041f\u0435\u0440\u0432\u0430\u044f, CVE-2024-26305 \u0432 \u0434\u0435\u043c\u043e\u043d\u0435 \u0443\u0442\u0438\u043b\u0438\u0442\u044b ArubaOS \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u043a\u0435\u0442\u044b \u043d\u0430 UDP-\u043f\u043e\u0440\u0442 PAPI.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 CVE-2024-26304 \u0438 CVE-2024-33511 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0441\u043b\u0443\u0436\u0431\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f L2/L3 \u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043e\u0442\u0447\u0435\u0442\u043e\u0432, \u0438\u0445 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u043d\u0430 \u043f\u043e\u0440\u0442 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 PAPI, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434.\n\n\u0418, \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f CVE-2024-33512, - \u044d\u0442\u043e \u043e\u0448\u0438\u0431\u043a\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b PAPI.\n\n\u041d\u0430\u0440\u044f\u0434\u0443 \u0441 \u043d\u0438\u043c\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u043a\u0440\u044b\u043b  \u0435\u0449\u0435 \u0448\u0435\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u0437\u043e\u0432 DoS \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 HPE Aruba Networking \u043d\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u0444\u0430\u043a\u0442\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438\u043b\u0438 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 PoC, \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u043c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u044c Enhanced PAPI Security \u0438 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2024-05-02T12:36:15.000000Z"}, {"uuid": "3378a11c-28c7-4a44-b59d-3c525761a083", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "seen", "source": "https://t.me/true_secator/5691", "content": "HPE Aruba Networking \u0438\u0441\u043f\u0440\u0430\u0432\u0438\u043b\u0430 \u0447\u0435\u0442\u044b\u0440\u0435 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 RCE-\u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u041e\u0421 ArubaOS \u0441 \u043e\u0446\u0435\u043d\u043a\u043e\u0439 CVSS v3.1: 9.8.\n\n\u0412\u0441\u0435 \u043e\u043d\u0438 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 HPE Aruba Networking Mobility Conductor, \u043c\u043e\u0431\u0438\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u043b\u0435\u0440\u044b, \u0448\u043b\u044e\u0437\u044b WLAN \u0438 \u0448\u043b\u044e\u0437\u044b SD-WAN, \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u0435\u043c\u044b\u0435 Aruba Central, ArubaOS 10.5.1.0 \u0438 \u043d\u0438\u0436\u0435, 10.4.1.0 \u0438 \u0441\u0442\u0430\u0440\u0448\u0435, 8.11.2.1 \u0438 \u043d\u0438\u0436\u0435, 8.10.0.10 \u0438 \u0441\u0442\u0430\u0440\u0448\u0435, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0432\u0441\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 ArubaOS \u0438 SD-WAN, \u0434\u043e\u0441\u0442\u0438\u0433\u0448\u0438\u0435 EoL.\n\n\u041f\u0435\u0440\u0432\u0430\u044f, CVE-2024-26305 \u0432 \u0434\u0435\u043c\u043e\u043d\u0435 \u0443\u0442\u0438\u043b\u0438\u0442\u044b ArubaOS \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u043e\u0442\u043f\u0440\u0430\u0432\u043b\u044f\u044f \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0435 \u043f\u0430\u043a\u0435\u0442\u044b \u043d\u0430 UDP-\u043f\u043e\u0440\u0442 PAPI.\n\n\u0414\u0432\u0435 \u0434\u0440\u0443\u0433\u0438\u0435 CVE-2024-26304 \u0438 CVE-2024-33511 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0442 \u0441\u043b\u0443\u0436\u0431\u044b \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f L2/L3 \u0438 \u0430\u0432\u0442\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0445 \u043e\u0442\u0447\u0435\u0442\u043e\u0432, \u0438\u0445 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043f\u0443\u0442\u0435\u043c \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0441\u043e\u0437\u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0430\u043a\u0435\u0442\u043e\u0432 \u043d\u0430 \u043f\u043e\u0440\u0442 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 PAPI, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434.\n\n\u0418, \u043d\u0430\u043a\u043e\u043d\u0435\u0446, \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u044f\u044f CVE-2024-33512, - \u044d\u0442\u043e \u043e\u0448\u0438\u0431\u043a\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c, \u043d\u0435 \u043f\u0440\u043e\u0448\u0435\u0434\u0448\u0438\u043c \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0443 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043a\u043e\u0434, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044f \u043f\u0435\u0440\u0435\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0431\u0443\u0444\u0435\u0440\u0430 \u0432 \u0441\u043b\u0443\u0436\u0431\u0435 \u0431\u0430\u0437\u044b \u0434\u0430\u043d\u043d\u044b\u0445 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u043f\u043e\u0434\u043b\u0438\u043d\u043d\u043e\u0441\u0442\u0438 \u043b\u043e\u043a\u0430\u043b\u044c\u043d\u044b\u0445 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u043a\u043e\u0442\u043e\u0440\u043e\u0439 \u043e\u0441\u0443\u0449\u0435\u0441\u0442\u0432\u043b\u044f\u0435\u0442\u0441\u044f \u0447\u0435\u0440\u0435\u0437 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b PAPI.\n\n\u041d\u0430\u0440\u044f\u0434\u0443 \u0441 \u043d\u0438\u043c\u0438 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a \u0442\u0430\u043a\u0436\u0435 \u0437\u0430\u043a\u0440\u044b\u043b  \u0435\u0449\u0435 \u0448\u0435\u0441\u0442\u044c \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u0441\u0440\u0435\u0434\u043d\u0435\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0438\u0432\u0430\u044e\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u0437\u043e\u0432 DoS \u043d\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 HPE Aruba Networking \u043d\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e \u043e \u0444\u0430\u043a\u0442\u0430\u0445 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0438\u043b\u0438 \u0432\u044b\u043f\u0443\u0441\u043a\u0435 PoC, \u0441\u0438\u0441\u0442\u0435\u043c\u043d\u044b\u043c \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430\u043c \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u044c Enhanced PAPI Security \u0438 \u043a\u0430\u043a \u043c\u043e\u0436\u043d\u043e \u0441\u043a\u043e\u0440\u0435\u0435 \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f.", "creation_timestamp": "2024-05-02T12:36:15.000000Z"}, {"uuid": "5a1af2a1-d89b-44b0-802c-33c4979e1728", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26308", "type": "seen", "source": "https://t.me/ctinow/203197", "content": "https://ift.tt/sa3ZmFM\nCVE-2024-26308 | Apache Commons Compress 1.21/1.22/1.23/1.24/1.25 allocation of resources", "creation_timestamp": "2024-03-08T10:22:12.000000Z"}, {"uuid": "57b21cdf-cede-427f-82e0-1978b678071c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26302", "type": "seen", "source": "https://t.me/ctinow/194991", "content": "https://ift.tt/wmMZQ4i\nCVE-2024-26302", "creation_timestamp": "2024-02-28T00:26:25.000000Z"}, {"uuid": "38cb10d1-8aff-4f88-a0fe-e32a1850ca5b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26300", "type": "seen", "source": "https://t.me/ctinow/194986", "content": "https://ift.tt/ZpcBDHj\nCVE-2024-26300", "creation_timestamp": "2024-02-28T00:26:17.000000Z"}, {"uuid": "53d232f1-a0c5-47f6-8726-5f639c06bc9c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26300", "type": "seen", "source": "https://t.me/ctinow/194989", "content": "https://ift.tt/ZpcBDHj\nCVE-2024-26300", "creation_timestamp": "2024-02-28T00:26:20.000000Z"}, {"uuid": "8c6071b7-10d6-4907-8678-7d0293d1b75a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/11232", "content": "#exploit\n1. CVE-2024-38816:\nSpring Framework 6.0.3 path traversal\nhttps://github.com/masa42/CVE-2024-38816-PoC\n\n2. CVE-2024-7479/7481:\nTeamViewer User to Kernel EoP\nhttps://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481\n\n3. CVE-2024-26304:\nCritical RCE in HPE Aruba Devices\nhttps://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits", "creation_timestamp": "2024-10-05T21:23:25.000000Z"}, {"uuid": "019edf79-83f9-4ab0-a980-f604a64f44fe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26308", "type": "seen", "source": "https://t.me/ctinow/187557", "content": "https://ift.tt/q0b4IQ3\nCVE-2024-26308", "creation_timestamp": "2024-02-19T10:21:46.000000Z"}, {"uuid": "f0de9f42-ba73-4c73-9547-13a59284aba5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3281", "content": "https://github.com/Roud-Roud-Agency/CVE-2024-26304-RCE-exploits\n\nCritical RCE Vulnerabilities in HPE Aruba Devices (may 2024)\n#github #exploit", "creation_timestamp": "2024-10-05T15:19:57.000000Z"}, {"uuid": "100ac9c3-6347-4a37-ac86-66526eba1727", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26304", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/3282", "content": "https://github.com/X-Projetion/CVE-2024-26304-RCE-exploit\n\nCVE-2024-26304 is a critical vulnerability (CVSS score of 9.8) affecting ArubaOS\n#github #exploit", "creation_timestamp": "2024-10-06T08:46:43.000000Z"}, {"uuid": "339e4633-285a-433f-81d3-322068b35ef5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26302", "type": "seen", "source": "https://t.me/ctinow/194988", "content": "https://ift.tt/wmMZQ4i\nCVE-2024-26302", "creation_timestamp": "2024-02-28T00:26:19.000000Z"}, {"uuid": "10764be0-c44a-4eb1-b7ea-e0769705649a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26301", "type": "seen", "source": "https://t.me/ctinow/194987", "content": "https://ift.tt/q0gwdWA\nCVE-2024-26301", "creation_timestamp": "2024-02-28T00:26:18.000000Z"}, {"uuid": "a1c5f153-d5ed-4271-9d19-46ac291a0b7d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26308", "type": "seen", "source": "https://t.me/ctinow/187559", "content": "https://ift.tt/q0b4IQ3\nCVE-2024-26308", "creation_timestamp": "2024-02-19T10:26:13.000000Z"}, {"uuid": "af580a99-2f37-4ea4-b6c4-dc1f0ca8a585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26300", "type": "seen", "source": "https://t.me/ctinow/208058", "content": "https://ift.tt/owc294p\nCVE-2024-26300 | HPE Aruba ClearPass Policy Manager up to 6.9.13/6.10.8/6.11.6/6.12.0 Guest Interface cross site scripting (ARUBA-PSA-2024-001)", "creation_timestamp": "2024-03-14T19:27:01.000000Z"}, {"uuid": "430b197a-3e36-4021-8190-d0f0215a3f4d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26301", "type": "seen", "source": "https://t.me/ctinow/208040", "content": "https://ift.tt/LK4GItd\nCVE-2024-26301 | HPE Aruba ClearPass Policy Manager up to 6.9.13/6.10.8/6.11.6/6.12.0 Web-based Management Interface information disclosure (ARUBA-PSA-2024-001)", "creation_timestamp": "2024-03-14T18:57:03.000000Z"}, {"uuid": "7ae35fe4-95c2-48eb-b8f2-bd56443930a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-26302", "type": "seen", "source": "https://t.me/ctinow/208057", "content": "https://ift.tt/UEelp48\nCVE-2024-26302 | HPE Aruba ClearPass Policy Manager up to 6.9.13/6.10.8/6.11.6/6.12.0 Web-based Management Interface information disclosure (ARUBA-PSA-2024-001)", "creation_timestamp": "2024-03-14T19:27:00.000000Z"}]}