First published: Wed Sep 06 2023(Updated: )
Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Arubaos | >=8.6.0.0<8.6.0.22 | |
Arubanetworks Arubaos | >=8.10.0.0<8.10.0.7 | |
Arubanetworks Arubaos | >=8.11.0.0<8.11.1.1 | |
Arubanetworks Arubaos | >=10.4.0.0<10.4.0.2 | |
Arubanetworks 9004 | ||
Arubanetworks 9004-lte | ||
Arubanetworks 9012 | ||
Arubanetworks 9240 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this BIOS vulnerability is CVE-2023-38485.
The severity of CVE-2023-38485 is high.
The affected software versions are ArubaOS between 8.6.0.0 and 8.6.0.22, ArubaOS between 8.10.0.0 and 8.10.0.7, ArubaOS between 8.11.0.0 and 8.11.1.1, and ArubaOS between 10.4.0.0 and 10.4.0.2.
An attacker can exploit CVE-2023-38485 to execute arbitrary code early in the boot sequence of Aruba 9200 and 9000 Series Controllers and Gateways.
No, Arubanetworks 9004 and 9004-lte are not vulnerable to CVE-2023-38485.