Vulnerabilities > CVE-2014-7299 - Unspecified vulnerability in Arubanetworks Arubaos 6.3.11/6.4.2.1
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN arubanetworks
nessus
Summary
Unspecified vulnerability in administrative interfaces in ArubaOS 6.3.1.11, 6.3.1.11-FIPS, 6.4.2.1, and 6.4.2.1-FIPS on Aruba controllers allows remote attackers to bypass authentication, and obtain potentially sensitive information or add guest accounts, via an SSH session.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 4 |
Nessus
NASL family | Misc. |
NASL id | ARUBAOS_AUTH_BYPASS_AID-10072014.NASL |
description | The version of ArubaOS has an unspecified vulnerability that allows a remote attacker to obtain limited administrative privileges without valid credentials. The vulnerability affects access over SSH. However, access through WebUI and the serial port is not affected, and the vulnerability does not provide |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 78510 |
published | 2014-10-16 |
reporter | This script is Copyright (C) 2014-2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/78510 |
title | ArubaOS 6.3.1.11 / 6.4.2.1 SSH Authentication Bypass |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/136997/aruba-nightmare.txt |
id | PACKETSTORM:136997 |
last seen | 2016-12-05 |
published | 2016-05-06 |
reporter | Google Security Research |
source | https://packetstormsecurity.com/files/136997/Aruba-Authentication-Bypass-Insecure-Transport-Tons-Of-Issues.html |
title | Aruba Authentication Bypass / Insecure Transport / Tons Of Issues |