First published: Wed Jul 05 2023(Updated: )
There is an unauthenticated buffer overflow vulnerability in the process controlling the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in a Denial-of-Service (DoS) condition affecting the web-based management interface of the controller.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
ArubaOS | >=6.5.4.0<8.6.0.21 | |
ArubaOS | >=8.7.0.0<8.10.0.7 | |
ArubaOS | >=8.11.0.0<8.11.1.1 | |
ArubaOS | >=10.4.0.0<10.4.0.2 | |
Aruba Networks MC-VA | ||
Aruba Networks MC-VA-1K | ||
Aruba Networks MC-VA-250 | ||
Aruba Networks MC-VA-50 | ||
Aruba Networks MCR-VA 10K | ||
Aruba Networks MCR-VA-1K | ||
Aruba Networks MCR-VA-50 | ||
Aruba Networks MCR-VA 500 | ||
Aruba Networks MCR-VA 5K | ||
Aruba Networks SD-WAN | ||
Aruba Networks MCR-HW-10K | ||
Arubanetworks MCR-HW-1K | ||
Aruba Networks MCR-HW-5K |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35979 is an unauthenticated buffer overflow vulnerability in the ArubaOS web-based management interface.
CVE-2023-35979 has a severity rating of 7.5, which is considered high.
CVE-2023-35979 affects ArubaOS versions between 6.5.4.0 and 8.6.0.21, versions between 8.7.0.0 and 8.10.0.7, and versions between 8.11.0.0 and 8.11.1.1.
Successful exploitation of CVE-2023-35979 leads to a Denial-of-Service (DoS) condition in the web-based management interface of the ArubaOS controller.
To fix CVE-2023-35979, it is recommended to upgrade to a patched version of ArubaOS that is not affected by the vulnerability.