2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2023-1168" ,
"sourceIdentifier" : "security-alert@hpe.com" ,
"published" : "2023-03-22T06:15:09.390" ,
2025-02-26 19:03:52 +00:00
"lastModified" : "2025-02-26T17:15:14.790" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
2023-11-07 21:03:21 +00:00
"value" : "An authenticated remote code execution vulnerability\n exists in the AOS-CX Network Analytics Engine. Successful\n exploitation of this vulnerability results in the ability to\n execute arbitrary code as a privileged user on the underlying\n operating system, leading to a complete compromise of the\n switch running AOS-CX.\n\n\n"
2023-04-24 12:24:31 +02:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "security-alert@hpe.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.2 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
2024-12-08 03:06:42 +00:00
"privilegesRequired" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 1.2 ,
2023-04-24 12:24:31 +02:00
"impactScore" : 5.9
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
2024-12-08 03:06:42 +00:00
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 8.8 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
2024-12-08 03:06:42 +00:00
"privilegesRequired" : "LOW" ,
2023-04-24 12:24:31 +02:00
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
2024-12-08 03:06:42 +00:00
"exploitabilityScore" : 2.8 ,
2023-04-24 12:24:31 +02:00
"impactScore" : 5.9
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-noinfo"
}
]
2025-02-26 19:03:52 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-77"
}
]
2023-04-24 12:24:31 +02:00
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.06.0000" ,
"versionEndExcluding" : "10.06.0240" ,
"matchCriteriaId" : "93B17071-FD9B-49C1-8C0B-FDA68664E773"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.08.0000" ,
"versionEndIncluding" : "10.08.1070" ,
"matchCriteriaId" : "6C8A631C-CB1E-4314-943D-713DC9EA260E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.09.0000" ,
"versionEndIncluding" : "10.09.1020" ,
"matchCriteriaId" : "936EB0DA-9A69-4E7B-B5F5-437A86B8C897"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hpe:arubaos-cx:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "10.10.0000" ,
"versionEndExcluding" : "10.10.1030" ,
"matchCriteriaId" : "690D819F-1B6E-48A1-BEDD-90B511048317"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_10000-48y6:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D10D4824-3D75-4CD2-A541-D910B91FD560"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6200f_48g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F9BC4F4F-5DF6-45D6-9039-BF06C5D53487"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6200m_24g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D05337A1-9022-41DA-AFED-AE76FC39D3C6"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6300m_24p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5172FB6C-C38E-4A5A-8C67-55B475C96B0A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6300m_48g:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3FF6C6CE-E842-420D-9C4C-54D4B4F85D14"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6405:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D118A9A6-BBA4-4149-AE0D-1DA2EB45B53F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_6410:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "790C5E7A-3405-4873-83E8-4D9C0FEC5E6D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8320-32:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "873275E0-0BF3-42A6-A88A-4A4CDCC98C37"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8320-48p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "65875CB1-A9A3-42CC-A14D-7AB4E985808A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8325-32c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "59B7E2D3-0B72-4A78-AEFA-F106FAD38156"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8325-48y8c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7E87A92B-4EE5-4235-A0DA-195F27841DBB"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-12c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6BC24E52-13C0-402F-9ABF-A1DE51719AEF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-16y2c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "76EF979E-061A-42A3-B161-B835E92ED180"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-24xf2c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE04919C-9289-4FB3-938F-F8BB15EC6A74"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-32y4c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B630C64B-C474-477D-A80B-A0FB73ACCC49"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-48xt4c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "53ABE8B8-A4F6-400B-A893-314BE24D06B8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8360-48y6c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C44383CC-3751-455E-B1AB-39B16F40DC76"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_8400:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B25A9CD2-5E5F-4BDB-8707-5D6941411A2B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:hpe:aruba_cx_9300_32d:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C595A15-BD04-45A3-A719-3DFB8DAB46E7"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-004.txt" ,
"source" : "security-alert@hpe.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-004.txt" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}