arubanetworks arubaos 在命令中使用的特殊元素转义处理不恰当(命令注入)
CVE编号
CVE-2020-24634利用情况
暂无补丁情况
N/A披露时间
2020-12-11漏洞描述
An attacker is able to remotely inject arbitrary commands by sending especially crafted packets destined to the PAPI (Aruba Networks AP Management protocol) UDP port (8211) of access-pointsor controllers in Aruba 9000 Gateway; Aruba 7000 Series Mobility Controllers; Aruba 7200 Series Mobility Controllers version(s): 2.1.0.1, 2.2.0.0 and below; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below ; 6.4.4.23, 6.5.4.17, 8.2.2.9, 8.3.0.13, 8.5.0.10, 8.6.0.5, 8.7.0.0 and below.解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
系统 | arubanetworks | arubaos | * | Up to (excluding) 8.2.2.10 | |||||
运行在以下环境 | |||||||||
系统 | arubanetworks | arubaos | * | From (including) 8.3.0.0 | Up to (excluding) 8.3.0.14 | ||||
运行在以下环境 | |||||||||
系统 | arubanetworks | arubaos | * | From (including) 8.4.0.0 | Up to (excluding) 8.5.0.11 | ||||
运行在以下环境 | |||||||||
系统 | arubanetworks | arubaos | * | From (including) 8.6.0.0 | Up to (excluding) 8.6.0.6 | ||||
运行在以下环境 | |||||||||
系统 | arubanetworks | arubaos | * | From (including) 8.7.0.0 | Up to (excluding) 8.7.1.0 | ||||
运行在以下环境 | |||||||||
系统 | arubanetworks | sd-wan | * | Up to (excluding) 2.1.0.2 | |||||
运行在以下环境 | |||||||||
系统 | arubanetworks | sd-wan | * | From (including) 2.2.0.0 | Up to (excluding) 2.2.0.1 | ||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7005 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7008 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7010 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7024 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7030 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7205 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7210 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7220 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7240xm | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 7280 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 9004 | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 9004-lte | - | - | |||||
运行在以下环境 | |||||||||
硬件 | arubanetworks | 9012 | - | - | |||||
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 未更改
- 用户交互 无
- 可用性 高
- 保密性 高
- 完整性 高
CWE-ID | 漏洞类型 |
CWE-77 | 在命令中使用的特殊元素转义处理不恰当(命令注入) |
Exp相关链接

版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论