First published: Wed Mar 01 2023(Updated: )
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks SD-WAN | >=8.7.0.0-2.3.0.0<=8.7.0.0-2.3.0.8 | |
arubanetworks ArubaOS | >=8.6.0.0<=8.6.0.19 | |
arubanetworks ArubaOS | >=8.10.0.0<=8.10.0.4 | |
arubanetworks ArubaOS | >=10.3.0.0<=10.3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-22756 is critical with a value of 9.8.
The affected software for CVE-2023-22756 includes Arubanetworks Sd-wan, Arubanetworks Arubaos (versions 8.6.0.0 to 8.6.0.19 and versions 8.10.0.0 to 8.10.0.4), and Arubanetworks Arubaos (versions 10.3.0.0 to 10.3.1.0).
CVE-2023-22756 can be exploited by sending specially crafted packets via the PAPI protocol.
Successful exploitation of CVE-2023-22756 allows for unauthenticated remote code execution, enabling the attacker to execute arbitrary code.
You can find more information about CVE-2023-22756 at the following link: [https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt)