Authenticated Remote Command Execution in ArubaOS Web-based Management Interface
CVE-2023-35972
What is CVE-2023-35972?
An authenticated remote command injection flaw exists in the web-based management interface of ArubaOS. This vulnerability allows attackers with appropriate access to execute arbitrary commands as a privileged user on the underlying operating system. By exploiting this weakness, malicious actors can gain full control over the affected system, posing significant risks to device integrity and network security.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 10.4.x.x: 10.4.0.1 and below
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 10.4.x.x: 10.4.0.1 and below
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 8.11.x.x: 8.11.1.0 and below
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved