First published: Wed Sep 06 2023(Updated: )
Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | >=8.6.0.0<8.6.0.22 | |
Arubanetworks Arubaos | >=8.10.0.0<8.10.0.7 | |
Arubanetworks Arubaos | >=8.11.0.0<8.11.1.1 | |
Arubanetworks Arubaos | >=10.4.0.0<10.4.0.2 | |
Arubanetworks 9004 | ||
Arubanetworks 9004-lte | ||
Arubanetworks 9012 | ||
Arubanetworks 9240 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-38484 is a vulnerability that exists in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways.
CVE-2023-38484 has a severity rating of 6.4, which is considered high.
An attacker could exploit CVE-2023-38484 to execute arbitrary code early in the boot sequence, allowing them to gain access to and change underlying sensitive information.
ArubaOS versions 8.6.0.0 to 8.6.0.22, 8.10.0.0 to 8.10.0.7, 8.11.0.0 to 8.11.1.1, and 10.4.0.0 to 10.4.0.2 are affected by CVE-2023-38484.
To fix CVE-2023-38484, it is recommended to apply the latest security patches and updates provided by Aruba Networks.