7.2
CVE-2026-44852
- EPSS 0.09%
- Veröffentlicht 12.05.2026 18:55:53
- Zuletzt bearbeitet 15.05.2026 21:16:36
- Quelle security-alert@hpe.com
- CVE-Watchlists
- Unerledigt
Authenticated Remote Code Execution via Arbitrary File Overwrite in the AOS-8 and AOS-10 Web-Based Management Interface
An authenticated remote code execution vulnerability exists in the AOS-8 and AOS-10 web-based management interface. A vulnerability in the certificate download functionality could allow an authenticated remote attacker to overwrite arbitrary files on the underlying operating system by exploiting improper input validation in the file path parameter. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system as a privileged user.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Arubanetworks ≫ Arubaos Version >= 6.5.4.0 < 8.10.0.22
Arubanetworks ≫ Arubaos Version >= 8.11.0.0 < 8.12.0.7
Arubanetworks ≫ Arubaos Version >= 8.13.0.0 < 8.13.1.2
Arubanetworks ≫ Arubaos Version >= 10.4.0.0 < 10.4.1.11
Arubanetworks ≫ Arubaos Version >= 10.5.0.0 < 10.7.2.3
Arubanetworks ≫ Sd-wan Version >= 8.6.0.4-2.2.0.0 <= 8.6.0.4-2.2.0.7
Arubanetworks ≫ Sd-wan Version >= 8.7.0.0-2.3.0.0 <= 8.7.0.0-2.3.0.9
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.09% | 0.256 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-alert@hpe.com | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-296 Improper Following of a Certificate's Chain of Trust
The product does not follow, or incorrectly follows, the chain of trust for a certificate back to a trusted root certificate, resulting in incorrect trust of any resource that is associated with that certificate.