First published: Fri Oct 07 2022(Updated: )
A vulnerability in the Aruba InstantOS and ArubaOS 10 web management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim’s browser in the context of the affected interface of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address this security vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | >=10.3.0.0<10.3.1.1 | |
Arubanetworks Instant | >=6.4.0.0<6.4.4.8-4.2.4.21 | |
Arubanetworks Instant | >=6.5.0.0<6.5.4.24 | |
Arubanetworks Instant | >=8.6.0.0<8.6.0.19 | |
Arubanetworks Instant | >=8.7.0.0<8.7.1.10 | |
Arubanetworks Instant | >=8.10.0.0<8.10.0.2 | |
Siemens Scalance W1750d Firmware | ||
Siemens SCALANCE W1750D |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-37892 is medium, with a severity value of 5.4.
CVE-2022-37892 is a vulnerability in the Aruba InstantOS and ArubaOS 10 web management interface that allows an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack.
ArubaOS versions from 10.3.0.0 to 10.3.1.1 and Aruba Instant versions from 6.4.0.0 to 6.4.4.8-4.2.4.21, 6.5.0.0 to 6.5.4.24, 8.6.0.0 to 8.6.0.19, 8.7.0.0 to 8.7.1.10, and 8.10.0.0 to 8.10.0.2 are affected by CVE-2022-37892.
An attacker can exploit CVE-2022-37892 by executing arbitrary script code in a victim user's browser through a stored cross-site scripting (XSS) attack.
More information about CVE-2022-37892 can be found in the official security advisory published by Aruba Networks and the Siemens ProductCERT document.