{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-42395","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2024-07-31T20:37:28.338Z","datePublished":"2024-08-06T18:56:05.348Z","dateUpdated":"2024-08-08T14:47:07.721Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"lessThanOrEqual":"<=8.12.0.1","status":"affected","version":"Version 8.12.0.0: 8.12.0.1 and below","versionType":"semver"},{"lessThanOrEqual":"<=8.10.0.12","status":"affected","version":"Version 8.10.0.0: 8.10.0.12 and below","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"}],"datePublic":"2024-08-06T19:16:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>There is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.</p>"}],"value":"There is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2024-08-06T19:42:44.319Z"},"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us&docLocale=en_US"}],"source":{"advisory":"HPESBNW04678","discovery":"EXTERNAL"},"title":"Unauthenticated Stack-Based Buffer Overflow Remote Command Execution (RCE) in the AP Certificate Management Service Accessed by the PAPI Protocol","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-295","lang":"en","description":"CWE-295 Improper Certificate Validation"}]}],"affected":[{"vendor":"arubanetworks","product":"instant","cpes":["cpe:2.3:o:arubanetworks:instant:8.12.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"8.12.0.0","status":"affected","lessThan":"8.12.0.2","versionType":"semver"}]},{"vendor":"arubanetworks","product":"instant","cpes":["cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"8.10.0.0","status":"affected","lessThan":"8.10.0.13","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-08-07T14:51:10.591351Z","id":"CVE-2024-42395","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-08-08T14:47:07.721Z"}}]}}