CVE-2024-31472

There are command injection vulnerabilities in the underlying Soft AP Daemon service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*
cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*

History

24 Jun 2025, 15:15

Type Values Removed Values Added
References
  • () https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04647en_us&docLocale=en_US -
References () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt - Vendor Advisory, Broken Link () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt - Broken Link, Vendor Advisory
Summary There are command injection vulnerabilities in the underlying Soft AP Daemon service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. There are command injection vulnerabilities in the underlying Soft AP Daemon service that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.

05 Jun 2025, 15:25

Type Values Removed Values Added
CPE cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*
References () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt - () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt - Vendor Advisory, Broken Link
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Arubanetworks arubaos
Arubanetworks
Hp instantos
Hp

14 May 2024, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 23:15

Updated : 2025-06-24 15:15


NVD link : CVE-2024-31472

Mitre link : CVE-2024-31472


JSON object : View

Products Affected

arubanetworks

  • arubaos

hp

  • instantos
CWE

No CWE.