CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L
AI Score
Confidence
High
EPSS
Percentile
48.2%
An authenticated remote code execution vulnerability exists in the command line interface in ArubaOS-Switch. Successful exploitation results in a Denial-of-Service (DoS) condition in the switch.
[
{
"defaultStatus": "affected",
"product": "ArubaOS-Switch",
"vendor": "Hewlett Packard Enterprise",
"versions": [
{
"status": "affected",
"version": "ArubaOS-Switch 16.11.xxxx: KB/WC/YA/YB/YC.16.11.0012 and below."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.10.xxxx: KB/WC/YA/YB/YC.16.10.0025 and below."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.10.xxxx: WB.16.10.23 and below."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.09.xxxx: All versions."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.08.xxxx: KB/WB/WC/YA/YB/YC.16.08.0026 and below."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.07.xxxx: All versions."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.06.xxxx: All versions."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.05.xxxx: All versions."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.04.xxxx: KA/RA.16.04.0026 and below."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.03.xxxx: All versions."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.02.xxxx: All versions."
},
{
"status": "affected",
"version": "ArubaOS-Switch 16.01.xxxx: All versions."
},
{
"status": "affected",
"version": "ArubaOS-Switch 15.xx.xxxx: 15.16.0025 and below."
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L
AI Score
Confidence
High
EPSS
Percentile
48.2%