First published: Wed Mar 01 2023(Updated: )
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Sd-wan | >=8.7.0.0-2.3.0.0<=8.7.0.0-2.3.0.8 | |
Arubanetworks Arubaos | >=8.6.0.0<=8.6.0.19 | |
Arubanetworks Arubaos | >=8.10.0.0<=8.10.0.4 | |
Arubanetworks Arubaos | >=10.3.0.0<=10.3.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this buffer overflow vulnerability is CVE-2023-22757.
The severity rating for CVE-2023-22757 is critical.
An attacker can exploit CVE-2023-22757 by sending specially crafted packets via the PAPI protocol, leading to unauthenticated remote code execution.
CVE-2023-22757 affects Arubanetworks SD-WAN versions 8.7.0.0-2.3.0.0 to 8.7.0.0-2.3.0.8, Arubanetworks ArubaOS versions 8.6.0.0 to 8.6.0.19, Arubanetworks ArubaOS versions 8.10.0.0 to 8.10.0.4, and Arubanetworks ArubaOS versions 10.3.0.0 to 10.3.1.0.
No, authentication is not required for an attacker to exploit CVE-2023-22757.