An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.
References
Link | Resource |
---|---|
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04647en_us&docLocale=en_US | |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt - Broken Link, Vendor Advisory | |
Summary | (en) An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point. | |
CPE | cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:* |
|
First Time |
Arubanetworks
Hp instantos Arubanetworks arubaos Hp |
Information
Published : 2024-05-14 23:15
Updated : 2025-06-24 16:15
NVD link : CVE-2024-31482
Mitre link : CVE-2024-31482
CVE.ORG link : CVE-2024-31482
JSON object : View
Products Affected
hp
- instantos
arubanetworks
- arubaos
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')