CVE-2023-22751 stack-based buffer overflow vulnerability in Aruba Networks access point management protoco
Reporter | Title | Published | Views | Family All 4 |
---|---|---|---|---|
![]() | CVE-2023-22751 Unauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol | 28 Feb 202316:28 | – | vulnrichment |
![]() | CVE-2023-22751 Unauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol | 28 Feb 202316:28 | – | cvelist |
![]() | CVE-2023-22751 | 1 Mar 202308:15 | – | nvd |
![]() | Stack overflow | 1 Mar 202308:15 | – | prion |
[
{
"defaultStatus": "affected",
"product": "Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"status": "affected",
"version": "ArubaOS 8.6.x.x: 8.6.0.19 and below"
},
{
"status": "affected",
"version": "ArubaOS 8.10.x.x: 8.10.0.4 and below"
},
{
"status": "affected",
"version": "ArubaOS 10.3.x.x: 10.3.1.0 and below"
},
{
"status": "affected",
"version": "SD-WAN 8.7.0.0-2.3.0.x: 8.7.0.0-2.3.0.8 and below"
}
]
}
]
Source | Link |
---|---|
arubanetworks | www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo