First published: Wed Mar 01 2023(Updated: )
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=8.7.0.0-2.3.0.0<=8.7.0.0-2.3.0.8 | |
Arubanetworks Arubaos | >=8.6.0.0<=8.6.0.19 | |
Arubanetworks Arubaos | >=8.10.0.0<=8.10.0.4 | |
Arubanetworks Arubaos | >=10.3.0.0<=10.3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22754 is a vulnerability that refers to buffer overflow vulnerabilities in multiple underlying operating system processes.
CVE-2023-22754 allows unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol.
The severity of CVE-2023-22754 is critical with a score of 9.8.
CVE-2023-22754 affects Arubanetworks SD-WAN versions 8.7.0.0-2.3.0.0 to 8.7.0.0-2.3.0.8, Arubanetworks ArubaOS versions 8.6.0.0 to 8.6.0.19, Arubanetworks ArubaOS versions 8.10.0.0 to 8.10.0.4, and Arubanetworks ArubaOS versions 10.3.0.0 to 10.3.1.0.
To fix CVE-2023-22754, it is recommended to apply the latest security patches or updates provided by Arubanetworks.