Multiple vulnerabilities in ArubaOS and Aruba SD-WAN



Published: 2022-10-26
Risk High
Patch available YES
Number of vulnerabilities 16
CVE-ID CVE-2022-37906
CVE-2022-37912
CVE-2022-37908
CVE-2022-37907
CVE-2022-37905
CVE-2022-37897
CVE-2022-37904
CVE-2022-37903
CVE-2022-37902
CVE-2022-37901
CVE-2022-37900
CVE-2022-37899
CVE-2022-37898
CVE-2022-37909
CVE-2022-37910
CVE-2022-37911
CWE-ID CWE-22
CWE-78
CWE-254
CWE-399
CWE-434
CWE-200
CWE-119
CWE-611
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
ArubaOS
Operating systems & Components / Operating system

SD-WAN
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor Aruba Networks

Security Bulletin

This security bulletin contains information about 16 vulnerabilities.

1) Path traversal

EUVDB-ID: #VU68771

Risk: Low

CVSSv3.1: 2.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37906

CWE-ID: CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Exploit availability: No

Description

The vulnerability allows a local user to delete arbitrary files on the system.

The vulnerability exists due to input validation error when processing directory traversal sequences within the command line interface. A local user can delete arbitrary files on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) OS Command Injection

EUVDB-ID: #VU68767

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37912

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Security features bypass

EUVDB-ID: #VU68773

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37908

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to insufficient integrity checks within the bootloader on 7xxx series controllers. A remote user can compromise the hardware chain of trust on the impacted controller.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Resource management error

EUVDB-ID: #VU68772

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37907

CWE-ID: CWE-399 - Resource Management Errors

Exploit availability: No

Description

The vulnerability allows a remote user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within the ArubaOS Bootloader on 7xxx series controllers. A remote user can perform a denial of service (DoS) attack.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

5) Security features bypass

EUVDB-ID: #VU68770

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37905

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists in the way ArubaOS handles boot process in 7xxx series controllers during the boot sequence. A remote authenticated user can achieve permanent modification of the underlying operating system and escalate privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

6) OS Command Injection

EUVDB-ID: #VU68761

Risk: High

CVSSv3.1: 8.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37897

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation when handling PAPI packets. A remote unauthenticated attacker can send specially crafted PAPI packets to port 8211/UDP to the system and execute arbitrary OS commands on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

7) Security features bypass

EUVDB-ID: #VU68769

Risk: Medium

CVSSv3.1: 6.5 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37904

CWE-ID: CWE-254 - Security Features

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists in the way ArubaOS handles boot process in 7xxx series controllers during the boot sequence. A remote authenticated user can achieve permanent modification of the underlying operating system and escalate privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

8) Arbitrary file upload

EUVDB-ID: #VU68768

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37903

CWE-ID: CWE-434 - Unrestricted Upload of File with Dangerous Type

Exploit availability: No

Description

The vulnerability allows a remote user to compromise vulnerable system.

The vulnerability exists due to insufficient validation of file during file upload within the web interface. A remote user can upload a malicious file and execute it on the device.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

9) OS Command Injection

EUVDB-ID: #VU68766

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37902

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

10) OS Command Injection

EUVDB-ID: #VU68765

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37901

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

11) OS Command Injection

EUVDB-ID: #VU68764

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37900

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

12) OS Command Injection

EUVDB-ID: #VU68763

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37899

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

13) OS Command Injection

EUVDB-ID: #VU68762

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37898

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation within the ArubaOS command line interface. A local user can pass specially crafted arguments to certain affected CLIs and execute arbitrary OS commands with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

14) Information disclosure

EUVDB-ID: #VU68774

Risk: Low

CVSSv3.1: 3.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37909

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a remote attacker to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output from the configured ESSIDs. A remote attacker can gain unauthorized access to sensitive information on the system.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

15) Buffer overflow

EUVDB-ID: #VU68775

Risk: Low

CVSSv3.1: 6.8 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37910

CWE-ID: CWE-119 - Memory corruption

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a boundary error in the command line interface. A local user can run a specially crafted command to trigger memory corruption and execute arbitrary code with elevated privileges.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

16) XML External Entity injection

EUVDB-ID: #VU68776

Risk: Low

CVSSv3.1: 3.9 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2022-37911

CWE-ID: CWE-611 - Improper Restriction of XML External Entity Reference ('XXE')

Exploit availability: No

Description

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to insufficient validation of user-supplied XML input within the command line interface. A local user can pass a specially crafted XML code to the system and view contents of arbitrary files on the system or initiate requests to external systems.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

ArubaOS: 6.5.4.0 - 10.3.0.0

SD-WAN: before 8.7.0.0-2.3.0.7

External links

http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###