{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-25614","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2024-02-08T18:08:46.265Z","datePublished":"2024-03-05T20:19:09.850Z","dateUpdated":"2024-10-29T20:21:27.256Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"ArubaOS Wi-Fi Controllers and Campus/Remote Access Points","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"status":"affected","version":"ArubaOS 10.5.x.x: 10.5.0.1 and below"},{"status":"affected","version":"ArubaOS 10.4.x.x: 10.4.0.3 and below"},{"status":"affected","version":"ArubaOS 8.11.x.x: 8.11.2.0 and below"},{"status":"affected","version":"ArubaOS 8.10.x.x:  8.10.0.9 and below"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Erik De Jong (bugcrowd.com/erikdejong)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There is an arbitrary file deletion vulnerability in the CLI used by ArubaOS. Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to denial-of-service conditions and impact the integrity of the controller. </p>"}],"value":"There is an arbitrary file deletion vulnerability in the CLI used by ArubaOS. Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to denial-of-service conditions and impact the integrity of the controller. \n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":5.5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2024-03-05T20:19:09.850Z"},"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-002.txt"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-03-06T16:13:05.103424Z","id":"CVE-2024-25614","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-29T20:21:27.256Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T23:44:09.823Z"},"title":"CVE Program Container","references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-002.txt","tags":["x_transferred"]}]}]}}