CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
34.1%
An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to delete arbitrary files in the underlying operating system.
Vendor | Product | Version | CPE |
---|---|---|---|
arubanetworks | arubaos | * | cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* |
arubanetworks | mc-va-10 | - | cpe:2.3:a:arubanetworks:mc-va-10:-:*:*:*:*:*:*:* |
arubanetworks | mc-va-1k | - | cpe:2.3:a:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:* |
arubanetworks | mc-va-250 | - | cpe:2.3:a:arubanetworks:mc-va-250:-:*:*:*:*:*:*:* |
arubanetworks | mc-va-50 | - | cpe:2.3:a:arubanetworks:mc-va-50:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-10k | - | cpe:2.3:a:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-1k | - | cpe:2.3:a:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-50 | - | cpe:2.3:a:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-500 | - | cpe:2.3:a:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:* |
arubanetworks | mcr-va-5k | - | cpe:2.3:a:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:* |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
34.1%