Authenticated Remote Command Execution in the ArubaOS Command Line Interface
CVE-2023-35973

7.2HIGH

Summary

ArubaOS, developed by Aruba Networks, is susceptible to authenticated command injection vulnerabilities within its command line interface. This security flaw allows an attacker with valid credentials to exploit the system, potentially granting them the ability to execute arbitrary commands as a privileged user. The ability to inject commands poses significant risks, including unauthorized access and manipulation of the underlying operating system, highlighting the urgency for users to apply security patches and mitigate potential threats.

Affected Version(s)

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 10.4.x.x: 10.4.0.1 and below

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 10.4.x.x: 10.4.0.1 and below

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 8.11.x.x: 8.11.1.0 and below

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erik de Jong (bugcrowd.com/erikdejong)
.