Risk | High |
Patch available | YES |
Number of vulnerabilities | 16 |
CVE-ID | CVE-2022-37906 CVE-2022-37912 CVE-2022-37908 CVE-2022-37907 CVE-2022-37905 CVE-2022-37897 CVE-2022-37904 CVE-2022-37903 CVE-2022-37902 CVE-2022-37901 CVE-2022-37900 CVE-2022-37899 CVE-2022-37898 CVE-2022-37909 CVE-2022-37910 CVE-2022-37911 |
CWE-ID | CWE-22 CWE-78 CWE-254 CWE-399 CWE-434 CWE-200 CWE-119 CWE-611 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
ArubaOS Operating systems & Components / Operating system SD-WAN Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Aruba Networks |
Security Bulletin
This security bulletin contains information about 16 vulnerabilities.
EUVDB-ID: #VU68771
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37906
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a local user to delete arbitrary files on the system.
The vulnerability exists due to input validation error when processing directory traversal sequences within the command line interface. A local user can delete arbitrary files on the system.
Install update from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68767
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37912
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68773
Risk: Low
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37908
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to insufficient integrity checks within the bootloader on 7xxx series controllers. A remote user can compromise the hardware chain of trust on the impacted controller.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68772
Risk: Low
CVSSv4.0: 2.1 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37907
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper management of internal resources within the ArubaOS Bootloader on 7xxx series controllers. A remote user can perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68770
Risk: Medium
CVSSv4.0: 5.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-37905
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists in the way ArubaOS handles boot process in 7xxx series controllers during the boot sequence. A remote authenticated user can achieve permanent modification of the underlying operating system and escalate privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68761
Risk: High
CVSSv4.0: 8.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID: CVE-2022-37897
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.
The vulnerability exists due to improper input validation when handling PAPI packets. A remote unauthenticated attacker can send specially crafted PAPI packets to port 8211/UDP to the system and execute arbitrary OS commands on the target system.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68769
Risk: Medium
CVSSv4.0: 5.2 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2022-37904
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists in the way ArubaOS handles boot process in 7xxx series controllers during the boot sequence. A remote authenticated user can achieve permanent modification of the underlying operating system and escalate privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68768
Risk: Low
CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37903
CWE-ID:
CWE-434 - Unrestricted Upload of File with Dangerous Type
Exploit availability: No
DescriptionThe vulnerability allows a remote user to compromise vulnerable system.
The vulnerability exists due to insufficient validation of file during file upload within the web interface. A remote user can upload a malicious file and execute it on the device.
MitigationInstall updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68766
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37902
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68765
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37901
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68764
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37900
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68763
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37899
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68762
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37898
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68774
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37909
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output from the configured ESSIDs. A remote attacker can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68775
Risk: Low
CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37910
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a boundary error in the command line interface. A local user can run a specially crafted command to trigger memory corruption and execute arbitrary code with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU68776
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2022-37911
CWE-ID:
CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information.
The vulnerability exists due to insufficient validation of user-supplied XML input within the command line interface. A local user can pass a specially crafted XML code to the system and view contents of arbitrary files on the system or initiate requests to external systems.
Install updates from vendor's website.
Vulnerable software versionsArubaOS: 6.5.4.0 - 10.3.0.0
SD-WAN: before 8.7.0.0-2.3.0.7
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.