Authenticated Remote Command Execution in the ArubaOS Command Line Interface
CVE-2023-35974

7.2HIGH

Summary

ArubaOS contains authenticated command injection vulnerabilities within its command line interface. These vulnerabilities allow an attacker with valid credentials to execute arbitrary commands with privileged access on the underlying operating system. This could lead to unauthorized data access, system compromise, and various security breaches. It is crucial for organizations using affected versions of ArubaOS to apply security updates to mitigate potential exploitation risks.

Affected Version(s)

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 10.4.x.x: 10.4.0.1 and below

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 10.4.x.x: 10.4.0.1 and below

Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central - ArubaOS 8.11.x.x: 8.11.1.0 and below

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Erik de Jong (bugcrowd.com/erikdejong)
.