The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of AOS

Aruba/HPE Switch: denial of service via Management Interface
An attacker can trigger a fatal error via Management Interface of Aruba/HPE Switch, in order to trigger a denial of service...
ARUBA-PSA-2021-002, CERTFR-2021-AVI-090, CVE-2021-25141, HPESBNW04082, VIGILANCE-VUL-34510
DNS: Man-in-the-Middle via SAD DNS ICMP Rate
An attacker can act as a Man-in-the-Middle via ICMP Rate on DNS, in order to read or write data in the session...
ARUBA-PSA-2021-008, CERTFR-2020-AVI-750, CERTFR-2020-AVI-764, CERTFR-2020-AVI-769, CERTFR-2020-AVI-776, CERTFR-2020-AVI-784, CERTFR-2020-AVI-786, CERTFR-2020-AVI-811, CERTFR-2020-AVI-834, CERTFR-2021-AVI-006, CERTFR-2021-AVI-122, CERTFR-2021-AVI-158, CERTFR-2021-AVI-183, CERTFR-2021-AVI-184, CERTFR-2021-AVI-201, CVE-2020-25705, DLA-2483-1, DLA-2494-1, HPESBNW04111, K09604370, openSUSE-SU-2020:2034-1, openSUSE-SU-2020:2112-1, openSUSE-SU-2020:2161-1, openSUSE-SU-2021:0242-1, RHSA-2021:0537-01, RHSA-2021:0558-01, RHSA-2021:0686-01, RHSA-2021:0765-01, RHSA-2021:0774-01, RHSA-2021:0856-01, RHSA-2021:0857-01, SAD DNS, SUSE-SU-2020:3326-1, SUSE-SU-2020:3484-1, SUSE-SU-2020:3491-1, SUSE-SU-2020:3501-1, SUSE-SU-2020:3503-1, SUSE-SU-2020:3507-1, SUSE-SU-2020:3512-1, SUSE-SU-2020:3513-1, SUSE-SU-2020:3522-1, SUSE-SU-2020:3532-1, SUSE-SU-2020:3544-1, SUSE-SU-2020:3717-1, SUSE-SU-2020:3764-1, USN-4657-1, USN-4658-1, USN-4658-2, USN-4659-1, USN-4659-2, USN-4680-1, VIGILANCE-VUL-33901
GRUB2: buffer overflow via grub.cfg, BootHole
An attacker can trigger a buffer overflow via grub.cfg of GRUB2, in order to trigger a denial of service, and possibly to run code...
ADV200011, ARUBA-PSA-2020-012, BootHole, CERTFR-2020-AVI-475, CERTFR-2020-AVI-476, CERTFR-2020-AVI-477, CERTFR-2020-AVI-485, CVE-2020-10713, DSA-2021-032, DSA-4735-1, DSA-4735-2, FEDORA-2020-41e57d7649, FEDORA-2020-e19b87f4f5, JSA11174, JSA11176, openSUSE-SU-2020:1168-1, openSUSE-SU-2020:1169-1, openSUSE-SU-2020:1190-1, openSUSE-SU-2020:1196-1, RHSA-2020:3216-01, RHSA-2020:3217-01, RHSA-2020:3223-01, RHSA-2020:3227-01, RHSA-2020:3271-01, RHSA-2020:3273-01, RHSA-2020:3274-01, RHSA-2020:3275-01, RHSA-2020:3276-01, SUSE-SU-2020:14440-1, SUSE-SU-2020:14490-1, SUSE-SU-2020:2073-1, SUSE-SU-2020:2074-1, SUSE-SU-2020:2076-1, SUSE-SU-2020:2077-1, SUSE-SU-2020:2078-1, SUSE-SU-2020:2079-1, SUSE-SU-2020:2158-1, SUSE-SU-2020:2159-1, SUSE-SU-2020:2160-1, SUSE-SU-2020:2166-1, SUSE-SU-2020:2626-1, SUSE-SU-2020:2627-1, SUSE-SU-2020:2628-1, SUSE-SU-2020:2629-1, USN-4432-1, USN-4432-2, VIGILANCE-VUL-32951, VU#174059
Treck IP Stack: multiple vulnerabilities
An attacker can use several vulnerabilities of Treck IP Stack...
ARUBA-PSA-2020-006, CERTFR-2020-AVI-375, cisco-sa-treck-ip-stack-JyBQ5GyC, CVE-2020-11896, CVE-2020-11897, CVE-2020-11898, CVE-2020-11899, CVE-2020-11900, CVE-2020-11901, CVE-2020-11902, CVE-2020-11903, CVE-2020-11904, CVE-2020-11905, CVE-2020-11906, CVE-2020-11907, CVE-2020-11908, CVE-2020-11909, CVE-2020-11910, CVE-2020-11911, CVE-2020-11912, CVE-2020-11913, CVE-2020-11914, HPESBHF04012, HPESBNW04010, Ripple20, VIGILANCE-VUL-32551, VU#257161
Aruba Intelligent Edge Switches: information disclosure via Web Management Interface
An attacker can bypass access restrictions to data via Web Management Interface of Aruba Intelligent Edge Switches, in order to obtain sensitive information...
ARUBA-PSA-2020-001, ASIRT-89, CERTFR-2020-AVI-086, CVE-2019-5322, VIGILANCE-VUL-31590
Aruba Mobility Controller: three vulnerabilities
An attacker can use several vulnerabilities of Aruba Mobility Controller...
ARUBA-PSA-2019-004, CERTFR-2019-AVI-422, CVE-2018-7081, CVE-2019-5314, CVE-2019-5315, VIGILANCE-VUL-30240
Linux kernel: denial of service via TCP SACK Low MSS Panic
An attacker can send malicious TCP SACK Low MSS Panic packets to Linux kernel, in order to trigger a denial of service...
1074268, 1442037, ARUBA-PSA-2020-010, CERTFR-2019-AVI-276, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-303, CERTFR-2019-AVI-309, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-561, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, cpujan2020, CTX256725, CVE-2019-11477, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K78234183, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SUSE-SU-2019:2950-1, SYMSA1492, Synology-SA-19:28, USN-4017-1, USN-4017-2, VIGILANCE-VUL-29543, VMSA-2019-0010, VMSA-2019-0010.1, VU#905115
Linux kernel: denial of service via TCP SACK Low MSS Resource
An attacker can trigger a fatal error via TCP SACK Low MSS Resource of the Linux kernel, in order to trigger a denial of service...
1074268, 6365341, ARUBA-PSA-2020-010, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-300, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, CERTFR-2021-AVI-146, cpujan2020, CVE-2019-11479, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K35421172, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:2430-1, SYMSA1492, Synology-SA-19:28, USN-4041-1, USN-4041-2, VIGILANCE-VUL-29546, VU#905115
Linux kernel: denial of service via TCP SACK Fragmented Retransmission Queue
An attacker can trigger a fatal error via TCP SACK Fragmented Retransmission Queue of the Linux kernel, in order to trigger a denial of service...
1074268, ARUBA-PSA-2020-010, CERTFR-2019-AVI-276, CERTFR-2019-AVI-277, CERTFR-2019-AVI-278, CERTFR-2019-AVI-298, CERTFR-2019-AVI-303, CERTFR-2019-AVI-309, CERTFR-2019-AVI-337, CERTFR-2019-AVI-429, CERTFR-2019-AVI-458, CERTFR-2019-AVI-597, CERTFR-2020-AVI-575, cpujan2020, CTX256725, CVE-2019-11478, DLA-1823-1, DLA-1824-1, DSA-2019-117, DSA-4465-1, FEDORA-2019-6c3d89b3d0, FEDORA-2019-914542e05c, FG-IR-19-180, K26618426, openSUSE-SU-2019:1570-1, openSUSE-SU-2019:1571-1, openSUSE-SU-2019:1579-1, PAN-SA-2019-0013, RHSA-2019:1479-01, RHSA-2019:1480-01, RHSA-2019:1481-01, RHSA-2019:1482-01, RHSA-2019:1483-01, RHSA-2019:1484-01, RHSA-2019:1485-01, RHSA-2019:1486-01, RHSA-2019:1487-01, RHSA-2019:1488-01, RHSA-2019:1489-01, RHSA-2019:1490-01, RHSA-2019:1602-01, SA44193, SB10287, sk156192, SSA-462066, SSB-439005, SUSE-SU-2019:14089-1, SUSE-SU-2019:1527-1, SUSE-SU-2019:1529-1, SUSE-SU-2019:1530-1, SUSE-SU-2019:1532-1, SUSE-SU-2019:1533-1, SUSE-SU-2019:1534-1, SUSE-SU-2019:1535-1, SUSE-SU-2019:1536-1, SUSE-SU-2019:1550-1, SUSE-SU-2019:1692-1, SUSE-SU-2019:1851-1, SUSE-SU-2019:1855-1, SUSE-SU-2019:2430-1, SUSE-SU-2019:2450-1, SYMSA1492, Synology-SA-19:28, USN-4017-1, USN-4017-2, VIGILANCE-VUL-29544, VMSA-2019-0010, VMSA-2019-0010.1, VU#905115
Aruba, Cisco Aironet, Meraki: memory corruption via Texas Instruments Bluetooth Low Energy
An attacker can generate a memory corruption via Texas Instruments Bluetooth Low Energy of products of several editors, in order to trigger a denial of service, and possibly to run code...
ARUBA-PSA-2018-006, BleedingBit, CERTFR-2018-AVI-528, cisco-sa-20181101-ap, CSCvk44163, CVE-2018-16986, VIGILANCE-VUL-27688, VU#317277
Our database contains other pages. You can request a free trial to read them.

Display information about AOS: