Aruba Central Comms: Arbitrary File Delete via PAPI
CVE-2024-31475 Published on May 14, 2024
There is an arbitrary file deletion vulnerability in the Central Communications service accessed by PAPI (Aruba's access point management protocol). Successful exploitation of this vulnerability results in the ability to delete arbitrary files on the underlying operating system, which could lead to the ability to interrupt normal operation and impact the integrity of the affected Access Point.
Vulnerability Analysis
CVE-2024-31475 can be exploited with network access, and does not require authorization privileges or user interaction. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, with no impact on integrity, and a high impact on availability.
Weakness Type
Deletion of Data Structure Sentinel
The accidental deletion of a data-structure sentinel can cause serious programming logic problems. Often times data-structure sentinels are used to mark structure of the data structure. A common example of this is the null character at the end of strings. Another common example is linked lists which may contain a sentinel to mark the end of the list. It is dangerous to allow this type of control data to be easily accessible. Therefore, it is important to protect from the deletion or modification outside of some wrapper interface which provides safety.
Products Associated with CVE-2024-31475
stack.watch emails you whenever new vulnerabilities are published in Aruba Networks Arubaos or HP Instantos. Just hit a watch button to start following.
Affected Versions
Hewlett Packard Enterprise (HPE) AOS-8 Instant and AOS-10 AP:- Version 10.5.0.0, <= 10.5.1.0 is affected.
- Version 10.4.0.0, <= 10.4.1.0 is affected.
- Version 8.11.0.0, <= 8.11.2.1 is affected.
- Version 8.10.0.0, <= 8.10.0.10 is affected.
- Version 8.6.0.0, <= 8.6.0.23 is affected.
- Version 10.5.0.0, <= 10.5.1.0 is affected.
- Version 10.4.0.0, <= 10.4.1.0 is affected.
- Version 8.10.0.0, <= 8.10.0.10 is affected.
- Version 8.11.0.0, <= 8.11.2.1 is affected.
- Version 8.6.0.0, <= 8.6.0.23 is affected.
- Version 10.3.0.0 and below 10.4.0.0 is affected.
- Version 8.9.0.0 and below 8.10.0.0 is affected.
- Version 8.8.0.0 and below 8.9.0.0 is affected.
- Version 8.5.0.0 and below 8.6.0.0 is affected.
- Version 8.7.0.0 and below 8.8.0.0 is affected.
- Version 8.4.0.0 and below 8.5.0.0 is affected.
- Version 6.5.0.0 and below 6.6.0.0 is affected.
- Version 6.4.0.0 and below 6.5.0.0 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.