7.5
CVE-2026-23827
- EPSS 0.12%
- Veröffentlicht 12.05.2026 18:54:47
- Zuletzt bearbeitet 15.05.2026 12:45:03
- Quelle security-alert@hpe.com
- CVE-Watchlists
- Unerledigt
Unauthenticated Remote Code Execution via Heap Buffer Overflow in Network Management Service
A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Arubanetworks ≫ Arubaos Version >= 6.5.4.0 < 8.10.0.22
Arubanetworks ≫ Arubaos Version >= 8.11.0.0 < 8.12.0.7
Arubanetworks ≫ Arubaos Version >= 8.13.0.0 < 8.13.1.2
Arubanetworks ≫ Arubaos Version >= 10.4.0.0 < 10.4.1.11
Arubanetworks ≫ Arubaos Version >= 10.5.0.0 < 10.7.2.3
Arubanetworks ≫ Sd-wan Version >= 8.6.0.4-2.2.0.0 <= 8.6.0.4-2.2.0.7
Arubanetworks ≫ Sd-wan Version >= 8.7.0.0-2.3.0.0 <= 8.7.0.0-2.3.0.9
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.12% | 0.3 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-alert@hpe.com | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
CWE-122 Heap-based Buffer Overflow
A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc().