Risk | Medium |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2022-47522 |
CWE-ID | CWE-311 |
Exploitation vector | Local network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software |
ArubaOS Operating systems & Components / Operating system Aruba Instant Hardware solutions / Routers & switches, VoIP, GSM, etc |
Vendor | Aruba Networks |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU74346
Risk: Medium
CVSSv4.0: 6.7 [CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:P/U:Green]
CVE-ID: CVE-2022-47522
CWE-ID:
CWE-311 - Missing Encryption of Sensitive Data
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to the way Wi-Fi devices manage transmit queues. A remote attacker can force the device to send traffic unencrypted by manipulating the transmit queues.
MitigationCybersecurity Help is currently unaware of any official solution to address this vulnerability.
Vulnerable software versionsArubaOS: 6.1.2.3 - 10.4.0.0
Aruba Instant: 4.2.4.17 - 8.10.0.2
CPE2.3https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-005.txt
https://papers.mathyvanhoef.com/usenix2023-wifi.pdf
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.