First published: Wed Jul 05 2023(Updated: )
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
arubanetworks ArubaOS | >=6.5.4.0<8.6.0.21 | |
arubanetworks ArubaOS | >=8.7.0.0<8.10.0.7 | |
arubanetworks ArubaOS | >=8.11.0.0<8.11.1.1 | |
arubanetworks ArubaOS | >=10.4.0.0<10.4.0.2 | |
Aruba Networks MC-VA | ||
Aruba Networks MC-VA-1K | ||
Aruba Networks MC-VA-250 | ||
Aruba Networks MC-VA-50 | ||
Aruba Networks MCR-VA 10K | ||
Aruba Networks MCR-VA-1K | ||
Aruba Networks MCR-VA-50 | ||
Aruba Networks MCR-VA 500 | ||
Aruba Networks MCR-VA 5K | ||
Aruba Networks SD-WAN | ||
Aruba Networks MCR-HW-10K | ||
Arubanetworks MCR-HW-1K | ||
Aruba Networks MCR-HW-5K |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface, allowing for the execution of arbitrary commands as a privileged user on the underlying operating system.
The severity of CVE-2023-35974 is high, with a severity value of 7.2.
ArubaOS versions 6.5.4.0 to 8.6.0.21, 8.7.0.0 to 8.10.0.7, 8.11.0.0 to 8.11.1.1, and 10.4.0.0 to 10.4.0.2 are affected by CVE-2023-35974.
Users are advised to upgrade to a patched version of ArubaOS and follow the recommendations provided by Aruba Networks.
More information about CVE-2023-35974 can be found at the following reference link: [Aruba Networks Advisory](https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt).