CVE-2024-31482
CVSS v3.1
5.3 (Medium)
EPSS
0.04 % (12th)
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.
- Base Severity
- Medium
- Base Score
-
- Impact Score
-
- Exploitability Score
-
Metrics
Attack Vector (AV) | Network |
---|---|
Attack Complexity (AC) | Low |
Privileges Required (PR) | None |
User Interaction (UI) | None |
Scope (S) | Unchanged |
Confidentiality (C) | None |
Integrity (I) | None |
Availability (A) | Low |
# ID | Name |
---|---|
CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') |
References
Source | URL | Tags |
---|---|---|
Hewlett Packard Enterprise (HPE) | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt | |
CVE | https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt |
Awaiting Analysis
- CVE Status
- PUBLISHED
- NVD Status
- Awaiting Analysis
- CNA
- Hewlett Packard Enterprise (HPE)
- Published Date
-
2024-05-14 23:15:12
(8 months ago) - Updated Date
-
2024-11-21 09:13:37
(2 months ago)
View CVE-2024-31482 on ...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...