First published: Wed Jul 05 2023(Updated: )
There is an unauthenticated buffer overflow vulnerability in the process controlling the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in a Denial-of-Service (DoS) condition affecting the web-based management interface of the controller.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | >=6.5.4.0<8.6.0.21 | |
Arubanetworks Arubaos | >=8.7.0.0<8.10.0.7 | |
Arubanetworks Arubaos | >=8.11.0.0<8.11.1.1 | |
Arubanetworks Arubaos | >=10.4.0.0<10.4.0.2 | |
Arubanetworks Mc-va-10 | ||
Arubanetworks Mc-va-1k | ||
Arubanetworks Mc-va-250 | ||
Arubanetworks Mc-va-50 | ||
Arubanetworks Mcr-va-10k | ||
Arubanetworks Mcr-va-1k | ||
Arubanetworks Mcr-va-50 | ||
Arubanetworks Mcr-va-500 | ||
Arubanetworks Mcr-va-5k | ||
Arubanetworks Sd-wan | ||
Arubanetworks Mcr-hw-10k | ||
Arubanetworks Mcr-hw-1k | ||
Arubanetworks Mcr-hw-5k |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-35979 is an unauthenticated buffer overflow vulnerability in the ArubaOS web-based management interface.
CVE-2023-35979 has a severity rating of 7.5, which is considered high.
CVE-2023-35979 affects ArubaOS versions between 6.5.4.0 and 8.6.0.21, versions between 8.7.0.0 and 8.10.0.7, and versions between 8.11.0.0 and 8.11.1.1.
Successful exploitation of CVE-2023-35979 leads to a Denial-of-Service (DoS) condition in the web-based management interface of the ArubaOS controller.
To fix CVE-2023-35979, it is recommended to upgrade to a patched version of ArubaOS that is not affected by the vulnerability.