Arubanetworks Arubaos vulnerabilities

198 known vulnerabilities affecting arubanetworks/arubaos.

Total CVEs
198
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL45HIGH94MEDIUM55LOW4

Vulnerabilities

Page 1 of 10
CVE-2026-23808HIGHCVSS 8.1≥ 6.5.4.0, ≤ 8.10.0.21≥ 8.11.0.0, ≤ 8.12.0.6+4 more2026-03-04
CVE-2026-23808 [MEDIUM] CWE-94 CVE-2026-23808: A vulnerability has been identified in a standardized wireless roaming protocol that could enable a A vulnerability has been identified in a standardized wireless roaming protocol that could enable a malicious actor to install an attacker-controlled Group Temporal Key (GTK) on a client device. Successful exploitation of this vulnerability could allow a remote malicious actor to perform unauthorized frame injection, bypass client isolation, interfere
nvd
CVE-2026-23809HIGHCVSS 7.6≥ 6.5.4.0, ≤ 8.10.0.21≥ 8.11.0.0, ≤ 8.12.0.6+4 more2026-03-04
CVE-2026-23809 [MEDIUM] CWE-400 CVE-2026-23809: A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that A technique has been identified that adapts a known port-stealing method to Wi-Fi environments that use multiple BSSIDs. By leveraging the relationship between BSSIDs and their associated virtual ports, an attacker could potentially bypass inter-BSSID isolation controls. Successful exploitation may enable an attacker to redirect and intercept the vic
nvd
CVE-2026-23812MEDIUMCVSS 4.2≥ 6.5.4.0, ≤ 8.10.0.21≥ 8.11.0.0, ≤ 8.12.0.6+4 more2026-03-04
CVE-2026-23812 [MEDIUM] CWE-300 CVE-2026-23812: A vulnerability has been identified where an attacker connecting to an access point as a standard wi A vulnerability has been identified where an attacker connecting to an access point as a standard wired or wireless client can impersonate a gateway by leveraging an address-based spoofing technique. Successful exploitation enables the redirection of data streams, allowing for the interception or modification of traffic intended for the legitimate n
nvd
CVE-2026-23601MEDIUMCVSS 5.4≥ 6.5.4.0, ≤ 8.10.0.21≥ 8.11.0.0, ≤ 8.12.0.6+4 more2026-03-04
CVE-2026-23601 [MEDIUM] CWE-327 CVE-2026-23601: A vulnerability has been identified in the wireless encryption handling of Wi-Fi transmissions. A ma A vulnerability has been identified in the wireless encryption handling of Wi-Fi transmissions. A malicious actor can generate shared-key authenticated transmissions containing targeted payloads while impersonating the identity of a primary BSSID.Successful exploitation allows for the delivery of tampered data to specific endpoints, bypassing standa
nvd
CVE-2026-23811LOWCVSS 3.1≥ 6.5.4.0, ≤ 8.10.0.21≥ 8.11.0.0, ≤ 8.12.0.6+4 more2026-03-04
CVE-2026-23811 [MEDIUM] CWE-300 CVE-2026-23811: A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) commu A vulnerability in the client isolation mechanism may allow an attacker to bypass Layer 2 (L2) communication restrictions between clients and redirect traffic at Layer 3 (L3). In addition to bypassing policy enforcement, successful exploitation - when combined with a port-stealing attack - may enable a bi-directional Machine-in-the-Middle (MitM) att
nvd
CVE-2026-23810LOWCVSS 3.1≥ 6.5.4.0, ≤ 8.10.0.21≥ 8.11.0.0, ≤ 8.12.0.6+4 more2026-03-04
CVE-2026-23810 [MEDIUM] CWE-300 CVE-2026-23810: A vulnerability in the packet processing logic may allow an authenticated attacker to craft and tran A vulnerability in the packet processing logic may allow an authenticated attacker to craft and transmit a malicious Wi-Fi frame that causes an Access Point (AP) to classify the frame as group-addressed traffic and re-encrypt it using the Group Temporal Key (GTK) associated with the victim's BSSID. Successful exploitation may enable GTK-independent
nvd
CVE-2025-37168CRITICALCVSS 9.1≥ 6.5.4.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.1+2 more2026-01-13
CVE-2025-37168 [HIGH] CWE-552 CVE-2025-37168: Arbitrary file deletion vulnerability have been identified in a system function of mobility conducto Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affecte
nvd
CVE-2025-37176HIGHCVSS 7.2≥ 8.6.0.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.12026-01-13
CVE-2025-37176 [MEDIUM] CWE-77 CVE-2025-37176: A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a packag A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the privileges of the impacted mechanism.
nvd
CVE-2025-37172HIGHCVSS 7.2≥ 8.6.0.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.12026-01-13
CVE-2025-37172 [HIGH] CWE-78 CVE-2025-37172: Authenticated command injection vulnerabilities exist in the web-based management interface of mobil Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
nvd
CVE-2025-37171HIGHCVSS 7.2≥ 8.6.0.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.12026-01-13
CVE-2025-37171 [HIGH] CWE-78 CVE-2025-37171: Authenticated command injection vulnerabilities exist in the web-based management interface of mobil Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
nvd
CVE-2025-37170HIGHCVSS 7.2≥ 8.6.0.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.12026-01-13
CVE-2025-37170 [HIGH] CWE-78 CVE-2025-37170: Authenticated command injection vulnerabilities exist in the web-based management interface of mobil Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.
nvd
CVE-2025-37173HIGHCVSS 7.2≥ 6.5.4.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.1+2 more2026-01-13
CVE-2025-37173 [HIGH] CWE-20 CVE-2025-37173: An improper input handling vulnerability exists in the web-based management interface of mobility co An improper input handling vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor with valid credentials to trigger unintended behavior on the affected system.
nvd
CVE-2025-37169HIGHCVSS 7.2≥ 10.3.0.0, < 10.4.1.10≥ 10.5.0.0, < 10.7.2.22026-01-13
CVE-2025-37169 [HIGH] CWE-787 CVE-2025-37169: A stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gat A stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system.
nvd
CVE-2025-37174HIGHCVSS 7.2≥ 6.5.4.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.1+2 more2026-01-13
CVE-2025-37174 [HIGH] CWE-277 CVE-2025-37174: Authenticated arbitrary file write vulnerability exists in the web-based management interface of mob Authenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating s
nvd
CVE-2025-37178HIGHCVSS 7.5≥ 8.6.0.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.12026-01-13
CVE-2025-37178 [MEDIUM] CWE-125 CVE-2025-37178: Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for ha Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential
nvd
CVE-2025-37175HIGHCVSS 7.2≥ 6.5.4.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.1+2 more2026-01-13
CVE-2025-37175 [HIGH] CWE-434 CVE-2025-37175: Arbitrary file upload vulnerability exists in the web-based management interface of mobility conduct Arbitrary file upload vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files as a privilege user and execute arbitrary commands on the underlying operating system.
nvd
CVE-2025-37177MEDIUMCVSS 6.5≥ 6.5.4.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.1+2 more2026-01-13
CVE-2025-37177 [MEDIUM] CWE-552 CVE-2025-37177: An arbitrary file deletion vulnerability has been identified in the command-line interface of mobili An arbitrary file deletion vulnerability has been identified in the command-line interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation of this vulnerability could allow an authenticated remote malicious actor to delete arbitrary files within the affected system.
nvd
CVE-2025-37179MEDIUMCVSS 5.3≥ 8.6.0.0, < 8.10.0.21≥ 8.11.0.0, < 8.13.1.12026-01-13
CVE-2025-37179 [MEDIUM] CWE-125 CVE-2025-37179: Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for ha Multiple out-of-bounds read vulnerabilities were identified in a system component responsible for handling certain data buffers. Due to insufficient validation of maximum buffer size values, the process may attempt to read beyond the intended memory region. Under specific conditions, this can result in a crash of the affected process and a potential
nvd
CVE-2025-37161HIGHCVSS 7.5fixed in 10.7.2.02025-11-18
CVE-2025-37161 [HIGH] CWE-400 CVE-2025-37161: A vulnerability in the web-based management interface of affected products could allow an unauthenti A vulnerability in the web-based management interface of affected products could allow an unauthenticated remote attacker to cause a denial of service. Successful exploitation could allow an attacker to crash the system, preventing it from rebooting without manual intervention and disrupting network operations.
nvd
CVE-2025-37162HIGHCVSS 8.8fixed in 10.7.2.02025-11-18
CVE-2025-37162 [MEDIUM] CWE-77 CVE-2025-37162: A vulnerability in the command line interface of affected devices could allow an authenticated remot A vulnerability in the command line interface of affected devices could allow an authenticated remote attacker to conduct a command injection attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.
nvd
1 / 10Next →