2023-08-01 20:00:35 +00:00
{
"id" : "CVE-2023-3718" ,
"sourceIdentifier" : "security-alert@hpe.com" ,
"published" : "2023-08-01T19:15:09.947" ,
2023-08-08 18:00:40 +00:00
"lastModified" : "2023-08-08T17:08:55.400" ,
"vulnStatus" : "Analyzed" ,
2023-08-01 20:00:35 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "\nAn authenticated command injection vulnerability exists in the AOS-CX command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands on the underlying operating system as a privileged user on the affected switch. This allows an attacker to fully compromise the underlying operating system on the device running AOS-CX.\n\n\n\n"
}
] ,
"metrics" : {
"cvssMetricV31" : [
2023-08-08 18:00:40 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
} ,
2023-08-01 20:00:35 +00:00
{
"source" : "security-alert@hpe.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 5.9
}
]
} ,
2023-08-08 18:00:40 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.10.0000" ,
"versionEndIncluding" : "10.10.1050" ,
"matchCriteriaId" : "04DE53FD-22EA-4BDF-97DD-AB8253F4F059"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.11.0000" ,
"versionEndIncluding" : "10.11.1010" ,
"matchCriteriaId" : "2649063A-E4A1-4548-877E-F1FAD3BBFC56"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_10000-48y6:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D10D4824-3D75-4CD2-A541-D910B91FD560"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_4100i:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B7C2B56C-203F-4290-BCE7-8BD751DF9CEF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6000_12g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8E276AD3-DEBD-4BE5-A7E0-A2017E09ADC8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6000_24g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A51A5922-69A1-4594-B74F-27E62E455170"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6000_48g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D397073F-2A04-4B88-BC6D-5F3B5EEB00F8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6100:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FF1DD310-3D31-4204-92E0-70C33EE44F08"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6200f:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FCD1A83B-109B-4596-AE37-706751E2B57D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6200f_48g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9BC4F4F-5DF6-45D6-9039-BF06C5D53487"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6200m:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1218AAA5-01ED-4D89-A7AE-A600356ABD46"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6200m_24g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D05337A1-9022-41DA-AFED-AE76FC39D3C6"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6300m_24p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5172FB6C-C38E-4A5A-8C67-55B475C96B0A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6300m_48g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3FF6C6CE-E842-420D-9C4C-54D4B4F85D14"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8320-32:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "873275E0-0BF3-42A6-A88A-4A4CDCC98C37"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8320-48p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "65875CB1-A9A3-42CC-A14D-7AB4E985808A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8325-32c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59B7E2D3-0B72-4A78-AEFA-F106FAD38156"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8325-48y8c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E87A92B-4EE5-4235-A0DA-195F27841DBB"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-12c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BC24E52-13C0-402F-9ABF-A1DE51719AEF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-16y2c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "76EF979E-061A-42A3-B161-B835E92ED180"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-24xf2c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE04919C-9289-4FB3-938F-F8BB15EC6A74"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-32y4c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B630C64B-C474-477D-A80B-A0FB73ACCC49"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-48xt4c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "53ABE8B8-A4F6-400B-A893-314BE24D06B8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-48y6c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C44383CC-3751-455E-B1AB-39B16F40DC76"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8400:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B25A9CD2-5E5F-4BDB-8707-5D6941411A2B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_9300_32d:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C595A15-BD04-45A3-A719-3DFB8DAB46E7"
}
]
}
]
}
] ,
2023-08-01 20:00:35 +00:00
"references" : [
{
"url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-010.txt" ,
2023-08-08 18:00:40 +00:00
"source" : "security-alert@hpe.com" ,
"tags" : [
"Mitigation" ,
"Vendor Advisory"
]
2023-08-01 20:00:35 +00:00
}
]
}