There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Metrics
Affected Vendors & Products
References
History
Mon, 12 Aug 2024 18:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Arubanetworks
Arubanetworks arubaos Hp Hp instantos |
|
Weaknesses | CWE-787 | |
CPEs | cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Arubanetworks
Arubanetworks arubaos Hp Hp instantos |
Wed, 07 Aug 2024 15:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Hpe
Hpe aruba Networking Instantos Hpe arubaos |
|
Weaknesses | CWE-200 | |
CPEs | cpe:2.3:o:hpe:aruba_networking_instantos:*:*:*:*:*:*:*:* cpe:2.3:o:hpe:arubaos:*:*:*:*:*:*:*:* |
|
Vendors & Products |
Hpe
Hpe aruba Networking Instantos Hpe arubaos |
|
Metrics |
ssvc
|
Tue, 06 Aug 2024 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 06 Aug 2024 19:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Tue, 06 Aug 2024 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise. | |
Title | Unauthenticated Stack-Based Buffer Overflow Remote Command Execution (RCE) in the Soft AP Daemon Service Accessed by the PAPI Protocol | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2024-08-07T14:27:21.760Z
Reserved: 2024-07-31T20:37:28.338Z
Link: CVE-2024-42394

Updated: 2024-08-07T14:26:58.200Z

Status : Analyzed
Published: 2024-08-06T19:15:56.830
Modified: 2024-08-12T18:23:19.533
Link: CVE-2024-42394

No data.