First published: Tue Aug 29 2023(Updated: )
An authenticated remote code execution vulnerability exists in the command line interface in ArubaOS-Switch. Successful exploitation results in a Denial-of-Service (DoS) condition in the switch.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
ArubaOS-Switch | <a.15.16.0026 | |
ArubaOS-Switch | >=16.01.0000<16.04.0027 | |
ArubaOS-Switch | >=16.05.0000<16.08.0027 | |
ArubaOS-Switch | >=16.10.0001<16.10.0024 | |
ArubaOS-Switch | >=16.11.0001<16.11.0013 | |
Aruba 2530 | ||
Aruba 2530 | ||
Aruba 2530 | ||
Aruba 2540 | ||
Aruba 2920 | ||
Aruba 2930F | ||
Aruba 2930M | ||
Aruba 3810M | ||
Aruba 5406R ZL2 Firmware | ||
Aruba 5412R ZL2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this ArubaOS-Switch vulnerability is CVE-2023-39267.
The severity of CVE-2023-39267 is medium with a CVSS score of 6.6.
The affected software for CVE-2023-39267 is ArubaOS-Switch versions a.15.16.0026 to 16.11.0013.
Exploiting CVE-2023-39267 can result in a Denial-of-Service (DoS) condition in the ArubaOS-Switch.
No, Arubanetworks Aruba 2530 is not vulnerable to CVE-2023-39267.