First published: Tue Sep 06 2022(Updated: )
A vulnerability exists in certain AOS-CX switch models which could allow an attacker with access to the recovery console to bypass normal authentication. A successful exploit allows an attacker to bypass system authentication and achieve total switch compromise in ArubaOS-CX Switches version(s): AOS-CX 10.10.xxxx: 10.10.0002 and below, AOS-CX 10.09.xxxx: 10.09.1030 and below, AOS-CX 10.08.xxxx: 10.08.1070 and below, AOS-CX 10.06.xxxx: 10.06.0210 and below. Aruba has released upgrades for ArubaOS-CX Switch Devices that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks AOS-CX | >=10.06.0000<=10.06.0210 | |
Aruba Networks AOS-CX | >=10.08.0000<=10.08.1070 | |
Aruba Networks AOS-CX | >=10.09.0000<=10.09.1030 | |
Aruba Networks AOS-CX | >=10.10.0000<=10.10.0002 | |
HPE Aruba Networking CX 10000 Series Switches | ||
Aruba Networks CX 8325 Firmware | ||
Aruba CX 8320 | ||
Aruba CX 9300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23691 has a critical severity level as it allows an attacker to bypass authentication and gain total control of affected ArubaOS-CX switches.
To remediate CVE-2022-23691, you should upgrade your ArubaOS-CX to the latest version that addresses this vulnerability.
CVE-2022-23691 affects ArubaOS-CX versions from 10.06.0000 to 10.10.0002 inclusive.
CVE-2022-23691 enables an attacker to bypass normal authentication via the recovery console and take complete control of the switch.
No, CVE-2022-23691 is specific to certain models of ArubaOS-CX switches and does not affect other Aruba switch series.