CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial
Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
[
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.10.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.10.0.0",
"lessThan": "8.10.0.10",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "10.5.0.0",
"lessThan": "10.5.1.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "10.4.0.0",
"lessThan": "10.4.1.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.11.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.11.0.0",
"lessThan": "8.11.2.1",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "10.3.0.0",
"lessThan": "10.4.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.9.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.9.0.0",
"lessThan": "8.10.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.8.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.8.0.0",
"lessThan": "8.9.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.7.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.7.0.0",
"lessThan": "8.8.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:8.6.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "8.6.0.0",
"lessThan": "8.7.0.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:6.5.4.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "arubaos",
"versions": [
{
"status": "affected",
"version": "6.5.4.0",
"lessThan": "6.5.5.0",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:a:arubanetworks:sd-wan:8.7.0.0:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "sd-wan",
"versions": [
{
"status": "affected",
"version": "8.7.0.0",
"lessThan": "*",
"versionType": "custom"
}
],
"defaultStatus": "affected"
},
{
"cpes": [
"cpe:2.3:a:arubanetworks:sd-wan:8.6.0.4:*:*:*:*:*:*:*"
],
"vendor": "arubanetworks",
"product": "sd-wan",
"versions": [
{
"status": "affected",
"version": "8.6.0.4",
"lessThan": "*",
"versionType": "custom"
}
],
"defaultStatus": "affected"
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
AI Score
Confidence
Low
SSVC
Exploitation
none
Automatable
yes
Technical Impact
partial