A memory corruption vulnerability in ArubaOS-Switch could lead to unauthenticated remote code execution by receiving specially crafted packets. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
References
Link | Resource |
---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-013.txt | Vendor Advisory |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-013.txt | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-08-29 20:15
Updated : 2024-11-21 08:15
NVD link : CVE-2023-39268
Mitre link : CVE-2023-39268
CVE.ORG link : CVE-2023-39268
JSON object : View
Products Affected
arubanetworks
- aruba_2930m
- aruba_5406r_zl2
- aruba_5412r_zl2
- aruba_3810m
- aruba_2920
- aruba_2530ya
- aruba_2930f
- aruba_2530
- aruba_2530yb
- aruba_2540
hpe
- arubaos-switch
CWE
CWE-787
Out-of-bounds Write