Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*", "matchCriteriaId": "226C7777-ECCC-49D2-8EB1-DD9EF57C90CC", "versionEndIncluding": "6.2.3.9", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9792484-1C9D-4A94-8BC0-F3389388037A", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "83D0BE40-36C1-4177-A545-BC1F7435C1BB", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "E6A8B524-49C4-4069-9F08-795EE3ABEFEC", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB28256E-588F-4FB4-896A-15AF51F96992", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "A2652D8B-C361-4349-B7FC-3C40BF0A3F43", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "22013B3A-82E6-4960-9D6D-0BEF991153F9", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "923BCFD5-15F0-4088-9E24-7CA5626AAB5B", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "F73767C4-E464-430D-AE4D-80544CDD5023", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "772E90DA-9454-4E4A-9E8E-82D9F6CCAFC6", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.1.3.9:*:*:*:*:*:*:*", "matchCriteriaId": "779FF186-DBB8-4299-862F-81BAF411AF62", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "6CFA43C9-68E3-4F6B-ACAD-38BB7E1CDB42", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "5F76952D-23C9-44BD-A93B-4EA5E934F481", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.3:*:*:*:*:*:*:*", "matchCriteriaId": "9E4E3800-202E-4599-8F9C-FA59A36006EB", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.4:*:*:*:*:*:*:*", "matchCriteriaId": "56CC06B0-0A1E-48CB-8C0E-77F287D7089F", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.5:*:*:*:*:*:*:*", "matchCriteriaId": "01B03A21-2068-4D87-BB91-23A2248450ED", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "5F679BAD-2DD2-4C68-9972-719B00E1B985", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.7:*:*:*:*:*:*:*", "matchCriteriaId": "A7E1847B-18D8-48B5-96AB-289B634D4E5A", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.2.3.8:*:*:*:*:*:*:*", "matchCriteriaId": "1043AAAB-7552-445A-ACDA-D09CDCC1CBC8", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "28014EEA-14CC-4BC7-8762-D40E5C4BA9B6", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B9240A24-DDAD-4796-81DA-C884F6816628", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "448B58B9-6693-4CF5-8E2A-686E62C6751A", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "D56FECAA-0C24-4F05-8782-08D9344BD177", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "76414368-D5D8-4A72-8314-2FF4B393763E", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "B7A40A06-AF71-4D9A-B2D5-4B0B3E29C602", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "C405B24F-ED7E-45C6-9752-0970B62BFE14", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "51A1AACA-EACF-4E7B-A03D-7BD5875F421E", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.7:*:*:*:*:*:*:*", "matchCriteriaId": "43D8D27F-7B6E-4444-950D-00EE3C739BF7", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.8:*:*:*:*:*:*:*", "matchCriteriaId": "33DE6F99-3E4E-4F54-90D3-FB542818C821", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "A183A679-A166-43A6-B087-42E836CB7F40", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.10:*:*:*:*:*:*:*", "matchCriteriaId": "74B79D94-3A33-4FEB-A335-CE6E8A4C7DCC", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.11:*:*:*:*:*:*:*", "matchCriteriaId": "280CDEE1-4B4B-45B1-8D3F-0E115050F1EF", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.12:*:*:*:*:*:*:*", "matchCriteriaId": "48D60A7F-143A-4A99-8ABD-77C6EC60392D", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.13:*:*:*:*:*:*:*", "matchCriteriaId": "CEA14349-BACC-4A0C-A5AD-0EAA17E1F544", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.3.1.14:*:*:*:*:*:*:*", "matchCriteriaId": "F4E02C8F-5161-4331-A2E7-1333AF9A0EEB", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.4.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "90646603-434E-498B-A4DF-4ABC8666CE4D", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.4.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "BE3AFA15-9EAF-4833-BE89-F9EB7E9C9B86", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:arubaos:6.4.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "6184E5F6-A647-4A0C-9A96-F666D18F4053", "vulnerable": true}], "negate": false, "operator": "OR"}]}], "cveTags": [], "descriptions": [{"lang": "en", "value": "The \"RAP console\" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors."}, {"lang": "es", "value": "La caracter\u00edstica 'RAP console' en ArubaOS 5.x hasta 6.2.x, 6.3.x anterior a 6.3.1.15, y 6.4.x anterior a 6.4.2.4 en los puntos de acceso de Aruba en el modo Remote Access Point (AP) permite a atacantes remotos ejecutar comandos arbitrarios a trav\u00e9s de vectores no especificados."}], "id": "CVE-2015-1388", "lastModified": "2025-04-12T10:46:40.837", "metrics": {"cvssMetricV2": [{"acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false}]}, "published": "2015-03-24T17:59:05.523", "references": [{"source": "cve@mitre.org", "tags": ["Vendor Advisory"], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt"}], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}