CVE-2025-37135
- EPSS 0.08%
- Veröffentlicht 14.10.2025 16:56:37
- Zuletzt bearbeitet 12.11.2025 21:12:21
Arbitrary file deletion vulnerabilities have been identified in the command-line interface of an AOS-8 Controller/Mobility Conductor. Successful exploitation of these vulnerabilities could allow an authenticated remote malicious actor to delete arbit...
CVE-2025-37134
- EPSS 0.09%
- Veröffentlicht 14.10.2025 16:56:05
- Zuletzt bearbeitet 12.11.2025 16:24:16
An authenticated command injection vulnerability exists in the CLI binary of an AOS-8 Controller/Mobility Conductor operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged u...
CVE-2025-37133
- EPSS 0.09%
- Veröffentlicht 14.10.2025 16:54:36
- Zuletzt bearbeitet 12.11.2025 16:33:35
An authenticated command injection vulnerability exists in the CLI binary of an AOS-8 Controller/Mobility Conductor operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged u...
CVE-2025-37132
- EPSS 0.06%
- Veröffentlicht 14.10.2025 16:53:16
- Zuletzt bearbeitet 12.11.2025 16:35:17
An arbitrary file write vulnerability exists in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitra...
CVE-2025-37148
- EPSS 0.11%
- Veröffentlicht 14.10.2025 16:43:35
- Zuletzt bearbeitet 14.10.2025 20:15:36
A vulnerability in the parsing of ethernet frames in AOS-8 Instant and AOS 10 could allow an unauthenticated remote attacker to conduct a denial of service attack. Successful exploitation could allow an attacker to potentially disrupt network service...
CVE-2025-37147
- EPSS 0.02%
- Veröffentlicht 14.10.2025 16:42:57
- Zuletzt bearbeitet 14.10.2025 20:15:36
A Secure Boot Bypass Vulnerability exists in affected Access Points that allows an adversary to bypass the hardware root of trust verification in place to ensure only vendor-signed firmware can execute on the device. An adversary can exploit this vul...
CVE-2025-37146
- EPSS 0.21%
- Veröffentlicht 14.10.2025 16:42:31
- Zuletzt bearbeitet 14.10.2025 19:35:56
A vulnerability in the web-based management interface of network access point configuration services could allow an authenticated remote attacker to perform remote command execution. Successful exploitation could allow an attacker to execute arbitrar...
CVE-2024-42507
- EPSS 1.44%
- Veröffentlicht 25.09.2024 01:15:42
- Zuletzt bearbeitet 26.09.2024 13:32:02
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful explo...
CVE-2024-42506
- EPSS 1.44%
- Veröffentlicht 25.09.2024 01:15:42
- Zuletzt bearbeitet 26.09.2024 13:32:02
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful explo...
CVE-2024-42505
- EPSS 1.21%
- Veröffentlicht 25.09.2024 01:15:42
- Zuletzt bearbeitet 26.09.2024 13:32:02
Command injection vulnerabilities in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful explo...