First published: Wed Mar 01 2023(Updated: )
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=8.7.0.0-2.3.0.0<=8.7.0.0-2.3.0.8 | |
Arubanetworks Arubaos | >=8.6.0.0<=8.6.0.19 | |
Arubanetworks Arubaos | >=8.10.0.0<=8.10.0.4 | |
Arubanetworks Arubaos | >=10.3.0.0<=10.3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22753 refers to buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution.
CVE-2023-22753 can be exploited by sending specially crafted packets via the PAPI protocol.
CVE-2023-22753 has a severity rating of critical with a CVSS score of 9.8.
CVE-2023-22753 affects Arubanetworks SD-WAN versions 8.7.0.0-2.3.0.0 to 8.7.0.0-2.3.0.8, Arubanetworks ArubaOS versions 8.6.0.0 to 8.6.0.19, Arubanetworks ArubaOS versions 8.10.0.0 to 8.10.0.4, and Arubanetworks ArubaOS versions 10.3.0.0 to 10.3.1.0.
To fix CVE-2023-22753, it is recommended to apply the security patches provided by Arubanetworks.