Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 12 |
CVE-ID | CVE-2022-23679 CVE-2022-23680 CVE-2022-23681 CVE-2022-23682 CVE-2022-23683 CVE-2022-23684 CVE-2022-23686 CVE-2022-23687 CVE-2022-23688 CVE-2022-23689 CVE-2022-23690 CVE-2022-23691 |
CWE-ID | CWE-352 CWE-78 CWE-264 CWE-20 CWE-200 CWE-287 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
AOS-CX 10000 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 9300 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 8400 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 8360 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 8325 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 8320 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 6400 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 6300 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 6200F Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 6100 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 6000 Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX 4100i Switch Series Hardware solutions / Routers & switches, VoIP, GSM, etc AOS-CX Hardware solutions / Firmware |
Vendor | Aruba Networks |
Security Bulletin
This security bulletin contains information about 12 vulnerabilities.
EUVDB-ID: #VU66894
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23679
CWE-ID:
CWE-352 - Cross-Site Request Forgery (CSRF)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website and execute commands on the affected device.
Install updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.1000
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66895
Risk: Medium
CVSSv3.1: 5.3 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23680
CWE-ID:
CWE-352 - Cross-Site Request Forgery (CSRF)
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website and execute commands on the affected device.
Install updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.1000
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66896
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23681
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the command line interface. A local user can execute arbitrary OS commands with root privileges.
Install updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.0002
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66897
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23682
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the command line interface. A local user can execute arbitrary OS commands with root privileges.
Install updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.0002
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66898
Risk: Low
CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23683
CWE-ID:
CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper input validation within the AOS-CX Network Analytics Engine. A local user can run a specially crafted NAE script to execute arbitrary code with elevated privileges.
Install updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.1000
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
The attacker would have to login to the system and perform certain actions in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66923
Risk: Medium
CVSSv3.1: 6.2 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23684
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote user to escalate privileges on the system.
The vulnerability exists due to application does not properly impose security restrictions within the the Web-Management Interface. A remote low-privileged user can bypass implemented security restrictions and elevate privileges on the device.
Install updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.0002
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66924
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23686
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing packets in LLDP service. A remote attacker can send specially crafted packets to the affected service and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.0002
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66925
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23687
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing packets in LLDP service. A remote attacker can send specially crafted packets to the affected service and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.0002
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66926
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23688
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing packets in LLDP service. A remote attacker can send specially crafted packets to the affected service and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.0002
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66927
Risk: Medium
CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23689
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input when processing packets in LLDP service. A remote attacker can send specially crafted packets to the affected service and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.0002
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66928
Risk: Low
CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23690
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the web interface. A remote attacker can fingerprint the exact version of the installed firmware.
Install updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8400 Switch Series: All versions
AOS-CX 8360 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX 6400 Switch Series: All versions
AOS-CX 6300 Switch Series: All versions
AOS-CX 6200F Switch Series: All versions
AOS-CX 6100 Switch Series: All versions
AOS-CX 6000 Switch Series: All versions
AOS-CX 4100i Switch Series: All versions
AOS-CX: before 10.10.0002
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU66929
Risk: Low
CVSSv3.1: 5.9 [CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2022-23691
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows an attacker to bypass authentication process.
The vulnerability exists due to an error, which allows an attacker with physical access to recovery console to bypass authentication process and gain unauthorized access to the device.
MitigationInstall updates from vendor's website.
Vulnerable software versionsAOS-CX 10000 Switch Series: All versions
AOS-CX 9300 Switch Series: All versions
AOS-CX 8325 Switch Series: All versions
AOS-CX 8320 Switch Series: All versions
AOS-CX: before 10.10.1000
External linkshttp://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-012.txt
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
How the attacker can exploit this vulnerability?
The attacker would have to send a specially crafted request to the affected device in order to exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.