{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-14T20:45:16.707","vulnerabilities":[{"cve":{"id":"CVE-2024-31478","sourceIdentifier":"security-alert@hpe.com","published":"2024-05-14T23:15:11.710","lastModified":"2025-06-24T15:15:22.803","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exists in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilites result in the ability to interrupt the normal operation of the affected Access Point."},{"lang":"es","value":"Existen múltiples vulnerabilidades de denegación de servicio (DoS) no autenticadas en el daemon Soft AP al que se accede a través del protocolo PAPI. La explotación exitosa de estas vulnerabilidades da como resultado la capacidad de interrumpir el funcionamiento normal del punto de acceso afectado."}],"metrics":{"cvssMetricV31":[{"source":"security-alert@hpe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":1.4},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3.0.0","versionEndExcluding":"10.4.1.1","matchCriteriaId":"C22DF47A-ECDC-4FB3-9361-2CE8972F2403"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5.0.0","versionEndExcluding":"10.5.1.1","matchCriteriaId":"3088AE26-C175-4D22-A550-30B97164D15B"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.0.0","versionEndExcluding":"8.6.0.24","matchCriteriaId":"3EF296DF-98BB-4347-A655-F3046220FFB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:instantos:*:*:*:*:*:*:*:*","versionStartIncluding":"8.7.0.0","versionEndExcluding":"8.10.0.11","matchCriteriaId":"5D7CDA65-CB99-4A70-9E12-B38BC7A69F1A"}]}]}],"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04647en_us&docLocale=en_US","source":"security-alert@hpe.com"},{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Vendor Advisory"]}]}}]}