First published: Wed Mar 01 2023(Updated: )
There are stack-based buffer overflow vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=8.7.0.0-2.3.0.0<=8.7.0.0-2.3.0.8 | |
Arubanetworks Arubaos | >=8.6.0.0<=8.6.0.19 | |
Arubanetworks Arubaos | >=8.10.0.0<=8.10.0.4 | |
Arubanetworks Arubaos | >=10.3.0.0<=10.3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22752 is a vulnerability in Aruba Networks' software that allows unauthenticated remote code execution through specially crafted packets sent to the PAPI UDP port.
The severity of CVE-2023-22752 is critical with a CVSS score of 9.8.
Aruba SD-WAN versions 8.7.0.0-2.3.0.0 to 8.7.0.0-2.3.0.8, ArubaOS versions 8.6.0.0 to 8.6.0.19, 8.10.0.0 to 8.10.0.4, and 10.3.0.0 to 10.3.1.0 are affected by CVE-2023-22752.
The CVE-2023-22752 vulnerability can be exploited by sending specially crafted packets to the PAPI UDP port (8211) of the affected Aruba Networks software.
Yes, Aruba Networks has released a security advisory with remediation steps to address the CVE-2023-22752 vulnerability.