First published: Wed Mar 01 2023(Updated: )
There are buffer overflow vulnerabilities in multiple underlying operating system processes that could lead to unauthenticated remote code execution by sending specially crafted packets via the PAPI protocol. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks SD-WAN | >=8.7.0.0-2.3.0.0<=8.7.0.0-2.3.0.8 | |
arubanetworks ArubaOS | >=8.6.0.0<=8.6.0.19 | |
arubanetworks ArubaOS | >=8.10.0.0<=8.10.0.4 | |
arubanetworks ArubaOS | >=10.3.0.0<=10.3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this buffer overflow vulnerability is CVE-2023-22757.
The severity rating for CVE-2023-22757 is critical.
An attacker can exploit CVE-2023-22757 by sending specially crafted packets via the PAPI protocol, leading to unauthenticated remote code execution.
CVE-2023-22757 affects Arubanetworks SD-WAN versions 8.7.0.0-2.3.0.0 to 8.7.0.0-2.3.0.8, Arubanetworks ArubaOS versions 8.6.0.0 to 8.6.0.19, Arubanetworks ArubaOS versions 8.10.0.0 to 8.10.0.4, and Arubanetworks ArubaOS versions 10.3.0.0 to 10.3.1.0.
No, authentication is not required for an attacker to exploit CVE-2023-22757.