First published: Wed Mar 01 2023(Updated: )
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=8.7.0.0-2.3.0.0<=8.7.0.0-2.3.0.8 | |
Arubanetworks Arubaos | >=8.6.0.0<=8.6.0.19 | |
Arubanetworks Arubaos | >=8.10.0.0<=8.10.0.4 | |
Arubanetworks Arubaos | >=10.3.0.0<=10.3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-22755 refers to buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution.
Arubanetworks Sd-wan versions 8.7.0.0-2.3.0.0 through 8.7.0.0-2.3.0.8 are affected by CVE-2023-22755.
Arubanetworks Arubaos versions 8.6.0.0 through 8.6.0.19, 8.10.0.0 through 8.10.0.4, and 10.3.0.0 through 10.3.1.0 are impacted by CVE-2023-22755.
The severity score of CVE-2023-22755 is 9.8, which is considered critical.
To mitigate the risks associated with CVE-2023-22755, it is recommended to apply the security updates provided by Arubanetworks.