First published: Thu Nov 03 2022(Updated: )
Vulnerabilities in ArubaOS running on 7xxx series controllers exist that allows an attacker to execute arbitrary code during the boot sequence. Successful exploitation could allow an attacker to achieve permanent modification of the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks SD-WAN | >=8.7.0.0-2.3.0.0<8.7.0.0-2.3.0.6 | |
arubanetworks ArubaOS | >=6.5.4.0<6.5.4.22 | |
arubanetworks ArubaOS | >=8.4.0.0<8.6.0.17 | |
arubanetworks ArubaOS | >=8.7.0.0<8.7.1.9 | |
arubanetworks ArubaOS | >=8.8.0.0<=8.9.0.3 | |
arubanetworks ArubaOS | =10.3.0.0 | |
Aruba Networks 7005 | ||
Aruba Networks 7008 | ||
Aruba 7010 | ||
Aruba Networks 7024 | ||
Aruba Networks 7030 | ||
Aruba Networks 7205 | ||
Aruba Networks 7210 | ||
Aruba Networks 7220 | ||
Aruba Networks 7240XM | ||
Aruba Networks 7280 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37905 is a vulnerability in ArubaOS running on 7xxx series controllers that allows an attacker to execute arbitrary code during the boot sequence.
The severity of CVE-2022-37905 is high with a CVSS score of 8.8.
ArubaOS versions 6.5.4.0 to 6.5.4.22, 8.4.0.0 to 8.6.0.17, 8.7.0.0 to 8.7.1.9, 8.8.0.0 to 8.9.0.3, and 10.3.0.0 are affected by CVE-2022-37905.
An attacker can exploit CVE-2022-37905 by leveraging the vulnerability to execute arbitrary code during the boot sequence of ArubaOS on 7xxx series controllers.
Yes, Aruba Networks has provided a fix for CVE-2022-37905. It is recommended to update to the latest version of ArubaOS to mitigate this vulnerability.