ArubaOS Web UI Authenticated RCE: Privileged Command Injection
CVE-2023-22759 Published on March 1, 2023
Authenticated Remote Command Execution in ArubaOS Web-based Management Interface
Authenticated remote command injection vulnerabilities exist in the ArubaOS web-based management interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system. This allows an attacker to fully compromise the underlying operating system on the device running ArubaOS.
Vulnerability Analysis
CVE-2023-22759 can be exploited with network access, and requires user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to be very high.
Products Associated with CVE-2023-22759
stack.watch emails you whenever new vulnerabilities are published in Aruba Networks Arubaos or Aruba Networks Sd Wan. Just hit a watch button to start following.
Affected Versions
Hewlett Packard Enterprise (HPE) Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central:- Version ArubaOS 8.6.x.x: 8.6.0.19 and below is affected.
- Version ArubaOS 8.10.x.x: 8.10.0.4 and below is affected.
- Version ArubaOS 10.3.x.x: 10.3.1.0 and below is affected.
- Version SD-WAN 8.7.0.0-2.3.0.x: 8.7.0.0-2.3.0.8 and below is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.