Authenticated Remote Command Execution in the ArubaOS Command Line Interface
CVE-2023-35973
Summary
ArubaOS, developed by Aruba Networks, is susceptible to authenticated command injection vulnerabilities within its command line interface. This security flaw allows an attacker with valid credentials to exploit the system, potentially granting them the ability to execute arbitrary commands as a privileged user. The ability to inject commands poses significant risks, including unauthorized access and manipulation of the underlying operating system, highlighting the urgency for users to apply security patches and mitigate potential threats.
Affected Version(s)
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 10.4.x.x: 10.4.0.1 and below
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 10.4.x.x: 10.4.0.1 and below
Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 8.11.x.x: 8.11.1.0 and below
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved