Aruba Networks Aruba Networks IT Edge Networking

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Aruba Networks product.

RSS Feeds for Aruba Networks security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Aruba Networks products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Aruba Networks Sorted by Most Security Vulnerabilities since 2018

Aruba Networks Arubaos129 vulnerabilities

Aruba Networks Sd Wan59 vulnerabilities

Aruba Networks Airwave33 vulnerabilities

Aruba Networks Instant31 vulnerabilities

Aruba Networks Clearpass17 vulnerabilities

Aruba Networks Airwave Glass12 vulnerabilities

Aruba Networks Aruba Instant11 vulnerabilities

By the Year

In 2026 there have been 0 vulnerabilities in Aruba Networks. Last year, in 2025 Aruba Networks had 9 security vulnerabilities published. Right now, Aruba Networks is on track to have less security vulnerabilities in 2026 than it did last year.




Year Vulnerabilities Average Score
2026 0 0.00
2025 9 6.57
2024 57 7.83
2023 125 7.47
2022 79 7.80
2021 116 7.21
2020 20 7.56
2019 8 7.50
2018 8 6.50

It may take a day or so for new Aruba Networks vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Aruba Networks Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2025-25039 Feb 04, 2025
Aruba ClearPass Manager Web UI Auth RCE A vulnerability in the web-based management interface of HPE Aruba Networking ClearPass Policy Manager (CPPM) allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system.
Clearpass Policy Manager
CVE-2025-23058 Feb 04, 2025
CVE-2025-23058: ClearPass Policy Manager Web UI Privilege Escalation A vulnerability in the ClearPass Policy Manager web-based management interface allows a low-privileged (read-only) authenticated remote attacker to gain unauthorized access to data and the ability to execute functions that should be restricted to administrators only with read/write privileges. Successful exploitation could enable a low-privileged user to execute administrative functions leading to an escalation of privileges.
Clearpass Policy Manager
CVE-2025-23059 Feb 04, 2025
ClearPass Web UI Authenticated Directory Disclosure (CVE-2025-23059) A vulnerability in the web-based management interface of HPE Aruba Networking ClearPass Policy Manager exposes directories containing sensitive information. If exploited successfully, this vulnerability allows an authenticated remote attacker with high privileges to access and retrieve sensitive data, potentially compromising the integrity and security of the entire system.
Clearpass Policy Manager
CVE-2025-23060 Feb 04, 2025
HPE Aruba ClearPass Policy Mgr: Unencrypted Data Exposure Allowing MITM A vulnerability in HPE Aruba Networking ClearPass Policy Manager may, under certain circumstances, expose sensitive unencrypted information. Exploiting this vulnerability could allow an attacker to perform a man-in-the-middle attack, potentially granting unauthorized access to network resources as well as enabling data tampering.
Clearpass Policy Manager
CVE-2025-23055 Jan 28, 2025
HPE Aruba Fabric Composer Stored XSS in Web Management Interface A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.
Fabric Composer
CVE-2025-23056 Jan 28, 2025
HPE Aruba Fabric Composer XSS Remote Auth Exploit A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.
Fabric Composer
CVE-2025-23057 Jan 28, 2025
HPE Aruba Fabric Composer XSS via Web UI (CVE202523057) A vulnerability in the web management interface of HPE Aruba Networking Fabric Composer could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack. If successfully exploited, a threat actor could run arbitrary script code in a victim's web browser within the context of the compromised interface.
Fabric Composer
CVE-2025-23054 Jan 28, 2025
Low-Privilege Bypass in HPE Aruba Fabric Composer Web UI Allows Unauthorized Config Changes A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an authenticated low privilege operator user to perform operations not allowed by their privilege level. Successful exploitation could allow an attacker to manipulate user generated files, potentially leading to unauthorized changes in critical system configurations.
Fabric Composer
CVE-2025-23053 Jan 28, 2025
Privilege Escalation in HPE Aruba Fabric Composer Web UI A privilege escalation vulnerability exists in the web-based management interface of HPE Aruba Networking Fabric Composer. Successful exploitation could allow an authenticated low privilege operator user to change the state of certain settings of a vulnerable system.
Fabric Composer
CVE-2024-53672 Dec 03, 2024
Arbitrary Command Execution in Aruba ClearPass Policy Manager Web Interface A vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploit could allow an attacker to execute arbitrary commands as a lower privileged user on the underlying operating system.
Clearpass Policy Manager
CVE-2024-51772 Dec 03, 2024
Arbitrary Command Execution in ClearPass Policy Manager Web Interface An authenticated RCE vulnerability in the ClearPass Policy Manager web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.
Clearpass Policy Manager
CVE-2024-51773 Dec 03, 2024
HPE Aruba Networking ClearPass Policy Manager: Stored XSS Vulnerability in Web Interface A vulnerability in the HPE Aruba Networking ClearPass Policy Manager web-based management interface could allow an authenticated remote Attacker to conduct a stored cross-site scripting (XSS) attack. Successful exploitation could enable a threat actor to perform any actions the user is authorized to do, including accessing the user's data and altering information within the user's permissions. This could lead to data modification, deletion, or theft, including unauthorized access to files, file deletion, or the theft of session cookies, which an attacker could use to hijack a user's session.
Clearpass
Clearpass Policy Manager
CVE-2024-51771 Dec 03, 2024
HPE Aruba Networking ClearPass Policy Manager: Authenticated Remote Code Execution Vulnerability A vulnerability in the HPE Aruba Networking ClearPass Policy Manager web-based management interface could allow an authenticated remote threat actor to conduct a remote code execution attack. Successful exploitation could enable the attacker to run arbitrary commands on the underlying operating system.
Clearpass
Clearpass Policy Manager
CVE-2024-42398 Aug 06, 2024
Unauthenticated DoS via Soft AP PAPI Exploit Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Arubaos
CVE-2024-42399 Aug 06, 2024
Soft AP daemon PAPI DoS: Unauthenticated exploitation Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Arubaos
CVE-2024-42400 Aug 06, 2024
Unauth DoS in Soft AP Daemon via PAPI Prevents AP Functionality Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Arubaos
CVE-2024-42395 Aug 06, 2024
CVE-2024-42395: AP Cert Mgmt Service Unauth RCE There is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Arubaos
CVE-2024-42394 Aug 06, 2024
Unauth RCE via Soft AP Daemon Service There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Arubaos
CVE-2024-42393 Aug 06, 2024
Unauthenticated RCE in Soft AP Daemon Service (CVE-2024-42393) There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Arubaos
CVE-2024-41915 Jul 30, 2024
ClearPass Policy Manager SQL Injection via Authenticated Web Interface A vulnerability in the web-based management interface of ClearPass Policy Manager could allow an authenticated remote attacker to conduct SQL injection attacks against the ClearPass Policy Manager instance. An attacker could exploit this vulnerability to obtain and modify sensitive information in the underlying database potentially leading to complete compromise of the ClearPass Policy Manager cluster.
Clearpass Policy Manager
CVE-2024-41916 Jul 30, 2024
ClearPass Policy Manager Admin Cleartext Data Leak Vulnerability A vulnerability exists in ClearPass Policy Manager that allows for an attacker with administrative privileges to access sensitive information in a cleartext format. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager.
Clearpass Policy Manager
CVE-2024-5486 Jul 30, 2024
CVE-2024-5486: ClearPass Policy Manager Admin Read Sensitive Data in Cleartext A vulnerability exists in ClearPass Policy Manager that allows for an attacker with administrative privileges to access sensitive information in a cleartext format. A successful exploit allows an attacker to retrieve information which could be used to potentially gain further access to network services supported by ClearPass Policy Manager
Clearpass Policy Manager
CVE-2024-41136 Jul 24, 2024
Command Injection in HPE Aruba EdgeConnect SD-WAN CLI An authenticated command injection vulnerability exists in the HPE Aruba Networking EdgeConnect SD-WAN gateways Command Line Interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Edgeconnect Sd Wan Orchestrator
CVE-2024-22444 Jul 24, 2024
EdgeConnect Orchestrator Reflected XSS in Web UI A vulnerability within the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow a remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victims browser in the context of the affected interface.
Edgeconnect Sd Wan Orchestrator
CVE-2024-41914 Jul 24, 2024
EdgeConnect SDWAN Orchestrator Authenticated Admin XSS to Execute Scripts A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Edgeconnect Sd Wan Orchestrator
CVE-2024-22443 Jul 24, 2024
EdgeConnect SD-WAN Orchestrator Prototype Pollution Enables OS Command Exec A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a server-side prototype pollution attack. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Edgeconnect Sd Wan Orchestrator
CVE-2024-31477 May 14, 2024
Unknown Authenticated CLI Command Injection Enabling Privileged OS Cmd Exec Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31467 May 14, 2024
ArubaAP CLI Buffer Overflow Enables Unauth RCE via PAPI UDP There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31468 May 14, 2024
BF in Aruba Central Comm svc -> unauth RCE via PAPI UDP 8211 There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31469 May 14, 2024
Buffer Overflow in Aruba Central Comm Service (PAPI) UDP 8211 -> RCE There are buffer overflow vulnerabilities in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31470 May 14, 2024
Aruba AP SAE Buffer Overflow Enables RCE via PAPI UDP There is a buffer overflow vulnerability in the underlying SAE (Simultaneous Authentication of Equals) service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31471 May 14, 2024
CVE-2024-31471 Aruba Central Comm PAPI UDP Command Injection There is a command injection vulnerability in the underlying Central Communications service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31472 May 14, 2024
Aruba Soft AP Daemon: UDP 8211 CoI Exploits PAPI (CVE-2024-31472) There are command injection vulnerabilities in the underlying Soft AP Daemon service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31473 May 14, 2024
Command injection in Aruba Access Point PAPI UDP 8211 enabling RCE There is a command injection vulnerability in the underlying deauthentication service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31475 May 14, 2024
Aruba Central Comms: Arbitrary File Delete via PAPI There is an arbitrary file deletion vulnerability in the Central Communications service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point.
Arubaos
CVE-2024-31483 May 14, 2024
CVE-2024-31483: Authenticated Info Leak via CLI PAPI Service allowing OS file read An authenticated sensitive information disclosure vulnerability exists in the CLI service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to read arbitrary files in the underlying operating system.
Arubaos
CVE-2024-31482 May 14, 2024
Unauthenticated DoS via ANSI Escape in PAPI Service An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.
Arubaos
CVE-2024-31481 May 14, 2024
Unauthenticated DoS via PAPI CLI Service Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.
Arubaos
CVE-2024-31480 May 14, 2024
Unauthenticated CLI DoS via PAPI Protocol Unauthenticated Denial of Service (DoS) vulnerabilities exist in the CLI service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.
Arubaos
CVE-2024-31479 May 14, 2024
Unauthenticated DoS in Central Communications Service via PAPI Unauthenticated Denial of Service (DoS) vulnerabilities exist in the Central Communications service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to interrupt the normal operation of the affected service.
Arubaos
CVE-2024-31474 May 14, 2024
Aruba AP CLI Arbitrary File Deletion via PAPI There is an arbitrary file deletion vulnerability in the CLI service accessed by PAPI (Aruba's Access Point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point
Arubaos
CVE-2024-31476 May 14, 2024
Authenticated CLI Command Injection Resulting in Privileged OS Code Execution Multiple authenticated command injection vulnerabilities exist in the command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Arubaos
CVE-2024-31478 May 14, 2024
Soft AP Daemon Unauthenticated DoS via PAPI Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exists in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilites result in the ability to interrupt the normal operation of the affected Access Point.
Arubaos
CVE-2024-31466 May 14, 2024
Aruba AP PAPI Buffer Overflow RCE There are buffer overflow vulnerabilities in the underlying CLI service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Arubaos
CVE-2024-33518 May 01, 2024
Unauthenticated DoS in Radio Frequency Manager via PAPI An unauthenticated Denial-of-Service (DoS) vulnerability exists in the Radio Frequency Manager service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected service.
Arubaos
CVE-2024-33513 May 01, 2024
Unauth DoS in AP Mngmt Service via PAPI Protocol Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
Arubaos
CVE-2024-33515 May 01, 2024
CVE-2024-33515: Unauth DoS in AP Management via PAPI Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
Arubaos
CVE-2024-33517 May 01, 2024
Unauthenticated DoS in Radio Frequency Manager (PAPI) An unauthenticated Denial-of-Service (DoS) vulnerability exists in the Radio Frequency Manager service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected service.
Arubaos
CVE-2024-33516 May 01, 2024
ArubaOS Auth Service PAPI DoS via Unauthenticated Request An unauthenticated Denial of Service (DoS) vulnerability exists in the Auth service accessed via the PAPI protocol provided by ArubaOS. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the controller.
Arubaos
CVE-2024-33514 May 01, 2024
Unauthenticated DoS in AP Management Service via PAPI Unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Management service accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected service.
Arubaos
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.