First published: Thu Nov 03 2022(Updated: )
Vulnerabilities in ArubaOS running on 7xxx series controllers exist that allows an attacker to execute arbitrary code during the boot sequence. Successful exploitation could allow an attacker to achieve permanent modification of the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=8.7.0.0-2.3.0.0<8.7.0.0-2.3.0.6 | |
Arubanetworks Arubaos | >=6.5.4.0<6.5.4.22 | |
Arubanetworks Arubaos | >=8.4.0.0<8.6.0.17 | |
Arubanetworks Arubaos | >=8.7.0.0<8.7.1.9 | |
Arubanetworks Arubaos | >=8.8.0.0<=8.9.0.3 | |
Arubanetworks Arubaos | =10.3.0.0 | |
Arubanetworks 7005 | ||
Arubanetworks 7008 | ||
Arubanetworks 7010 | ||
Arubanetworks 7024 | ||
Arubanetworks 7030 | ||
Arubanetworks 7205 | ||
Arubanetworks 7210 | ||
Arubanetworks 7220 | ||
Arubanetworks 7240xm | ||
Arubanetworks 7280 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37905 is a vulnerability in ArubaOS running on 7xxx series controllers that allows an attacker to execute arbitrary code during the boot sequence.
The severity of CVE-2022-37905 is high with a CVSS score of 8.8.
ArubaOS versions 6.5.4.0 to 6.5.4.22, 8.4.0.0 to 8.6.0.17, 8.7.0.0 to 8.7.1.9, 8.8.0.0 to 8.9.0.3, and 10.3.0.0 are affected by CVE-2022-37905.
An attacker can exploit CVE-2022-37905 by leveraging the vulnerability to execute arbitrary code during the boot sequence of ArubaOS on 7xxx series controllers.
Yes, Aruba Networks has provided a fix for CVE-2022-37905. It is recommended to update to the latest version of ArubaOS to mitigate this vulnerability.