First published: Wed Mar 01 2023(Updated: )
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=8.7.0.0-2.3.0.0<=8.7.0.0-2.3.0.8 | |
Arubanetworks Arubaos | >=8.6.0.0<=8.6.0.19 | |
Arubanetworks Arubaos | >=8.10.0.0<=8.10.0.4 | |
Arubanetworks Arubaos | >=10.3.0.0<=10.3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-22756 is critical with a value of 9.8.
The affected software for CVE-2023-22756 includes Arubanetworks Sd-wan, Arubanetworks Arubaos (versions 8.6.0.0 to 8.6.0.19 and versions 8.10.0.0 to 8.10.0.4), and Arubanetworks Arubaos (versions 10.3.0.0 to 10.3.1.0).
CVE-2023-22756 can be exploited by sending specially crafted packets via the PAPI protocol.
Successful exploitation of CVE-2023-22756 allows for unauthenticated remote code execution, enabling the attacker to execute arbitrary code.
You can find more information about CVE-2023-22756 at the following link: [https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt)