First published: Thu Nov 03 2022(Updated: )
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=8.7.0.0-2.3.0.0<8.7.0.0-2.3.0.7 | |
Arubanetworks Arubaos | >=6.5.4.0<6.5.4.23 | |
Arubanetworks Arubaos | >=8.4.0.0<8.6.0.18 | |
Arubanetworks Arubaos | >=8.7.0.0<8.7.1.10 | |
Arubanetworks Arubaos | >=8.8.0.0<=8.9.0.3 | |
Arubanetworks Arubaos | =10.3.0.0 | |
Arubanetworks 7005 | ||
Arubanetworks 7008 | ||
Arubanetworks 7010 | ||
Arubanetworks 7024 | ||
Arubanetworks 7030 | ||
Arubanetworks 7205 | ||
Arubanetworks 7210 | ||
Arubanetworks 7220 | ||
Arubanetworks 7240xm | ||
Arubanetworks 7280 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-37898.
The severity level of CVE-2022-37898 is high with a CVSS score of 7.2.
ArubaOS versions 6.5.4.0 to 6.5.4.23, 8.4.0.0 to 8.6.0.18, 8.7.0.0 to 8.7.1.10, 8.8.0.0 to 8.9.0.3, and ArubaSD-WAN versions 8.7.0.0 to 8.7.0.0-2.3.0.7 are affected by CVE-2022-37898.
Successful exploitation of CVE-2022-37898 allows an authenticated attacker to execute arbitrary commands as a privileged user on the underlying operating system.
Yes, it is recommended to apply the latest security patches and updates provided by Aruba Networks to mitigate the vulnerability.