First published: Wed Jul 05 2023(Updated: )
A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
ArubaOS | >=6.5.4.0<8.6.0.21 | |
ArubaOS | >=8.7.0.0<8.10.0.7 | |
ArubaOS | >=8.11.0.0<8.11.1.1 | |
ArubaOS | >=10.4.0.0<10.4.0.2 | |
Aruba Networks MC-VA | ||
Aruba Networks MC-VA-1K | ||
Aruba Networks MC-VA-250 | ||
Aruba Networks MC-VA-50 | ||
Aruba Networks MCR-VA 10K | ||
Aruba Networks MCR-VA-1K | ||
Aruba Networks MCR-VA-50 | ||
Aruba Networks MCR-VA 500 | ||
Aruba Networks MCR-VA 5K | ||
Aruba Networks SD-WAN | ||
Aruba Networks MCR-HW-10K | ||
Arubanetworks MCR-HW-1K | ||
Aruba Networks MCR-HW-5K |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35971 is a vulnerability in the ArubaOS web-based management interface that allows an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack.
ArubaOS versions 6.5.4.0 to 8.6.0.21, 8.7.0.0 to 8.10.0.7, 8.11.0.0 to 8.11.1.1, and 10.4.0.0 to 10.4.0.2 are affected by CVE-2023-35971.
CVE-2023-35971 has a severity rating of 6.1, which is considered high.
To fix CVE-2023-35971, it is recommended to upgrade to a patched version of ArubaOS that addresses the vulnerability.
More information about CVE-2023-35971 can be found in the Aruba Networks security advisory at https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt.