2024-12-08 03:06:42 +00:00

157 lines
5.4 KiB
JSON

{
"id": "CVE-2023-38484",
"sourceIdentifier": "security-alert@hpe.com",
"published": "2023-09-06T18:15:08.393",
"lastModified": "2024-11-21T08:13:39.917",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could\u00a0allow an attacker to execute arbitrary code early in the boot\u00a0sequence. An attacker could exploit this vulnerability to\u00a0gain access to and change underlying sensitive information\u00a0in the affected controller leading to complete system\u00a0compromise."
},
{
"lang": "es",
"value": "Existen vulnerabilidades en la implementaci\u00f3n de la BIOS de los Controladores y Gateways de las Series 9200 y 9000 de Aruba que podr\u00edan permitir a un atacante ejecutar c\u00f3digo arbitrario en las primeras etapas de la secuencia de inicio. Un atacante podr\u00eda aprovechar esta vulnerabilidad para obtener acceso y cambiar informaci\u00f3n sensible subyacente en el controlador afectado, lo que comprometer\u00eda completamente el sistema."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-alert@hpe.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.3,
"impactScore": 6.0
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.6.0.0",
"versionEndExcluding": "8.6.0.22",
"matchCriteriaId": "ADB9BE64-9455-46B2-80C8-BD9B88A8F372"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.10.0.0",
"versionEndExcluding": "8.10.0.7",
"matchCriteriaId": "48293E3F-C6BD-4875-8C7A-67ED41B7C18D"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "8.11.0.0",
"versionEndExcluding": "8.11.1.1",
"matchCriteriaId": "A22E7E61-B318-47C8-8C72-498A17031997"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*",
"versionStartIncluding": "10.4.0.0",
"versionEndExcluding": "10.4.0.2",
"matchCriteriaId": "6418722E-304A-46EF-8D9E-EB42596F0DFC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CFA13FF5-7C60-48B4-AF46-18A9F19D5D42"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0B1EB3D9-77B5-4DBE-9518-23DD0DA06BC9"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17162DB3-973E-47C6-9157-39A0E94603F2"
},
{
"vulnerable": false,
"criteria": "cpe:2.3:h:arubanetworks:9240:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6BF9E0D-630F-40B4-9109-560CA13C981B"
}
]
}
]
}
],
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt",
"source": "security-alert@hpe.com",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
}
]
}