An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.
                
            References
                    | Link | Resource | 
|---|---|
| https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbnw04072en_us | Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| AND | 
                                
                                
 
  | 
                        
Configuration 2 (hide)
| AND | 
                                
                                
 
  | 
                        
Information
                Published : 2020-12-10 18:15
Updated : 2021-11-18 10:17
NVD link : CVE-2020-24634
Mitre link : CVE-2020-24634
JSON object : View
CWE
                
                    
                        
                        CWE-77
                        
            Improper Neutralization of Special Elements used in a Command ('Command Injection')
Products Affected
                arubanetworks
- 7210
 - 7030
 - sd-wan
 - 7024
 - 9004-lte
 - 7005
 - 7205
 - 7240xm
 - 7008
 - arubaos
 - 9004
 - 7220
 - 7010
 - 9012
 - 7280
 


