Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to a reflected cross-site scripting (XSS). The vulnerability is present in the VisualRF component of AirWave. By exploiting this vulnerability, an attacker who can trick a logged-in AirWave administrative user into clicking a link could obtain sensitive information, such as session cookies or passwords. The vulnerability requires that an administrative users click on the malicious link while currently logged into AirWave in the same browser.
Max CVSS
6.1
EPSS Score
0.12%
Published
2018-08-06
Updated
2018-10-09
Aruba Airwave all versions up to, but not including, 8.2.3.1 is vulnerable to an XML external entities (XXE). XXEs are a way to permit XML parsers to access storage that exist on external systems. If an unprivileged user is permitted to control the contents of XML files, XXE can be used as an attack vector. Because the XML parser has access to the local filesystem and runs with the permissions of the web server, it can access any file that is readable by the web server and copy it to an external system of the attacker's choosing. This could include files that contain passwords, which could then lead to privilege escalation.
Max CVSS
8.8
EPSS Score
0.68%
Published
2018-08-06
Updated
2018-10-16
Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows administrative users to escalate privileges to root on the underlying OS.
Max CVSS
7.2
EPSS Score
0.05%
Published
2023-09-05
Updated
2023-09-08
Aruba AirWave before 7.7.14.2 and 8.x before 8.0.7 allows VisualRF remote OS command execution and file disclosure by administrative users.
Max CVSS
7.2
EPSS Score
0.05%
Published
2023-09-05
Updated
2023-09-08
Aruba AirWave before 8.0.7 allows bypass of a CSRF protection mechanism.
Max CVSS
8.8
EPSS Score
0.06%
Published
2023-09-05
Updated
2023-09-08
Aruba AirWave before 8.0.7 allows XSS attacks agsinat an administrator.
Max CVSS
6.1
EPSS Score
0.05%
Published
2023-09-05
Updated
2023-09-08
6 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!