Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
References
Link | Resource |
---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt | Vendor Advisory |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt - Vendor Advisory |
08 Aug 2023, 14:21
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.2 |
CWE | CWE-78 |
15 Dec 2022, 14:27
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-12 13:15
Updated : 2024-11-21 07:15
NVD link : CVE-2022-37898
Mitre link : CVE-2022-37898
CVE.ORG link : CVE-2022-37898
JSON object : View
Products Affected
arubanetworks
- sd-wan
- 7024
- 7205
- 7210
- 7280
- 7008
- 7220
- 7010
- 7005
- 7240xm
- arubaos
- 7030
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')