An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.
References
Link | Resource |
---|---|
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04647en_us&docLocale=en_US | |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt | Broken Link Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt - Broken Link, Vendor Advisory | |
Summary | (en) An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point. |
05 Jun 2025, 15:26
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt - Vendor Advisory, Broken Link | |
First Time |
Arubanetworks arubaos
Hp instantos Arubanetworks Hp |
|
CPE | cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:* cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* |
21 Nov 2024, 09:13
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt - |
03 Jul 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-78 | |
Summary |
|
14 May 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-14 23:15
Updated : 2025-06-24 16:15
NVD link : CVE-2024-31482
Mitre link : CVE-2024-31482
CVE.ORG link : CVE-2024-31482
JSON object : View
Products Affected
hp
- instantos
arubanetworks
- arubaos
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')