2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2022-37900" ,
"sourceIdentifier" : "security-alert@hpe.com" ,
"published" : "2022-12-12T13:15:12.677" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T07:15:20.537" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-11-07 21:03:21 +00:00
"value" : "Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system. \n\n"
2024-04-04 08:46:00 +00:00
} ,
{
"lang" : "es" ,
"value" : "Existen vulnerabilidades de inyecci\u00f3n de comandos autenticadas en la interfaz de l\u00ednea de comandos de ArubaOS. La explotaci\u00f3n exitosa de estas vulnerabilidades da como resultado la capacidad de ejecutar comandos arbitrarios como usuario privilegiado en el sistema operativo subyacente."
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "security-alert@hpe.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "HIGH" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 1.2 ,
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
2023-11-07 21:03:21 +00:00
"value" : "CWE-78"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:arubanetworks:sd-wan:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.7.0.0-2.3.0.0" ,
"versionEndExcluding" : "8.7.0.0-2.3.0.7" ,
"matchCriteriaId" : "0103D83D-C5A8-4F59-B5AF-B6F39A3F613F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "6.5.4.0" ,
"versionEndExcluding" : "6.5.4.23" ,
"matchCriteriaId" : "174292ED-9C76-4815-8DBA-E83CB1A59E96"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.4.0.0" ,
"versionEndExcluding" : "8.6.0.18" ,
"matchCriteriaId" : "28D7A806-4AB8-49DD-91D0-E81E3B4FD468"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.7.0.0" ,
"versionEndExcluding" : "8.7.1.10" ,
"matchCriteriaId" : "F6E4F019-F048-4E6C-9EC7-B9B6A776C246"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.8.0.0" ,
"versionEndIncluding" : "8.9.0.3" ,
"matchCriteriaId" : "0AAF010C-30AB-43D2-BAAB-813B869675FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "84A36EB0-A525-4B05-B9CE-A31145A7157C"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7005:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE128072-9444-40D5-AC86-BB317869EB97"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7008:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F747F71E-66BC-4776-BCCC-3123F8EEEBC6"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7010:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59612211-5054-44DC-B028-61A2C5C6133D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7024:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "15FE873C-3C45-4EA3-9AD1-D07F132BC31F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7030:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E8E68DB6-149B-4469-BD27-69F1AC59166F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7205:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E9AA178-1327-402E-8740-8409ECA448BC"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7210:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9969F899-4D7A-4DD5-B81D-DB16B20CF86A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7220:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CF33BAD0-0596-4910-B096-99E2033F73D8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7240xm:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FDDFDA5E-3895-463A-86EA-1823EC1B5045"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:arubanetworks:7280:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3BBA9A71-BE10-471A-A8BE-5CCB8CE8393F"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt" ,
"source" : "security-alert@hpe.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-016.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}