7.5

CVE-2023-35979

Unauthenticated Buffer Overflow Vulnerability in ArubaOS Web-Based Management Interface

There is an unauthenticated buffer overflow vulnerability in the process controlling the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in a Denial-of-Service (DoS) condition affecting the web-based management interface of the controller.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ArubanetworksArubaos Version >= 6.5.4.0 < 8.6.0.21
   ArubanetworksMc-va-10 Version-
   ArubanetworksMc-va-1k Version-
   ArubanetworksMc-va-250 Version-
   ArubanetworksMc-va-50 Version-
   ArubanetworksMcr-va-10k Version-
   ArubanetworksMcr-va-1k Version-
   ArubanetworksMcr-va-50 Version-
   ArubanetworksMcr-va-500 Version-
   ArubanetworksMcr-va-5k Version-
   ArubanetworksSd-wan Version-
   ArubanetworksMcr-hw-10k Version-
   ArubanetworksMcr-hw-1k Version-
   ArubanetworksMcr-hw-5k Version-
ArubanetworksArubaos Version >= 8.7.0.0 < 8.10.0.7
   ArubanetworksMc-va-10 Version-
   ArubanetworksMc-va-1k Version-
   ArubanetworksMc-va-250 Version-
   ArubanetworksMc-va-50 Version-
   ArubanetworksMcr-va-10k Version-
   ArubanetworksMcr-va-1k Version-
   ArubanetworksMcr-va-50 Version-
   ArubanetworksMcr-va-500 Version-
   ArubanetworksMcr-va-5k Version-
   ArubanetworksSd-wan Version-
   ArubanetworksMcr-hw-10k Version-
   ArubanetworksMcr-hw-1k Version-
   ArubanetworksMcr-hw-5k Version-
ArubanetworksArubaos Version >= 8.11.0.0 < 8.11.1.1
   ArubanetworksMc-va-10 Version-
   ArubanetworksMc-va-1k Version-
   ArubanetworksMc-va-250 Version-
   ArubanetworksMc-va-50 Version-
   ArubanetworksMcr-va-10k Version-
   ArubanetworksMcr-va-1k Version-
   ArubanetworksMcr-va-50 Version-
   ArubanetworksMcr-va-500 Version-
   ArubanetworksMcr-va-5k Version-
   ArubanetworksSd-wan Version-
   ArubanetworksMcr-hw-10k Version-
   ArubanetworksMcr-hw-1k Version-
   ArubanetworksMcr-hw-5k Version-
ArubanetworksArubaos Version >= 10.4.0.0 < 10.4.0.2
   ArubanetworksMc-va-10 Version-
   ArubanetworksMc-va-1k Version-
   ArubanetworksMc-va-250 Version-
   ArubanetworksMc-va-50 Version-
   ArubanetworksMcr-va-10k Version-
   ArubanetworksMcr-va-1k Version-
   ArubanetworksMcr-va-50 Version-
   ArubanetworksMcr-va-500 Version-
   ArubanetworksMcr-va-5k Version-
   ArubanetworksSd-wan Version-
   ArubanetworksMcr-hw-10k Version-
   ArubanetworksMcr-hw-1k Version-
   ArubanetworksMcr-hw-5k Version-
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.17% 0.38
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
security-alert@hpe.com 5.3 3.9 1.4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.