First published: Tue Sep 06 2022(Updated: )
Multiple vulnerabilities exist in the AOS-CX command line interface that could lead to authenticated command injection. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete switch compromise in ArubaOS-CX version(s): AOS-CX 10.09.xxxx: 10.09.1030 and below, AOS-CX 10.08.xxxx: 10.08.1030 and below, AOS-CX 10.06.xxxx: 10.06.0180 and below. Aruba has released upgrades for ArubaOS-CX Switch Devices that address these security vulnerabilities.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks AOS-CX | >=10.06.0000<10.06.0220 | |
Aruba Networks AOS-CX | >=10.08.0000<10.08.1080 | |
Aruba Networks AOS-CX | >=10.09.0000<10.09.1040 | |
Aruba Networks AOS-CX | >=10.10.0000<10.10.0002 | |
HPE Aruba Networking CX 10000 Series Switches | ||
Aruba Networks CX 8325 Firmware | ||
Aruba CX 8320 | ||
Aruba CX 9300 | ||
Aruba CX 8360 | ||
Aruba Networks CX 6400 | ||
Aruba Networks CX 6300 | ||
Aruba CX 6200F | ||
Aruba Networks CX 6100 | ||
Aruba CX 6000 | ||
Aruba Networks CX 4100i | ||
Aruba Networks CX 8400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23682 has a high severity rating as it allows for authenticated command injection leading to potential root access on affected systems.
To fix CVE-2022-23682, upgrade the AOS-CX software to a version that is not affected by this vulnerability.
CVE-2022-23682 affects ArubaOS-CX versions 10.06.0000 to 10.06.0220, 10.08.0000 to 10.08.1080, 10.09.0000 to 10.09.1040, and 10.10.0000 to 10.10.0002.
CVE-2022-23682 requires authenticated access, meaning it cannot be exploited remotely without valid credentials.
Exploiting CVE-2022-23682 can lead to complete compromise of the affected switch, allowing attackers to execute arbitrary commands as root.