CVE-2022-37885

CVSS V2 None CVSS V3 Critical 9.8
Description
There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities.
Overview
  • CVE ID
  • CVE-2022-37885
  • Assigner
  • security-alert@hpe.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2022-10-07T18:15:21
  • Last Modified Date
  • 2022-12-13T20:06:26
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* 1 OR 10.3.0.0 10.3.1.1
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* 1 OR 6.4.0.0 6.4.4.8-4.2.4.21
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* 1 OR 6.5.0.0 6.5.4.24
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* 1 OR 8.6.0.0 8.6.0.19
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* 1 OR 8.7.0.0 8.7.1.10
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* 1 OR 8.10.0.0 8.10.0.2
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 9.8
  • Base Severity
  • CRITICAL
  • Exploitability Score
  • 3.9
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-10-07 19:00:20 Added to TrackCVE
2022-12-07 05:48:16 2022-10-07T18:15Z 2022-10-07T18:15:21 CVE Published Date updated
2022-12-07 05:48:16 2022-11-08T14:15:11 CVE Modified Date updated
2022-12-07 05:48:16 Undergoing Analysis Vulnerability Status updated
2022-12-07 05:48:23 References updated
2022-12-13 20:14:51 2022-12-13T20:06:26 CVE Modified Date updated
2022-12-13 20:14:51 Undergoing Analysis Analyzed Vulnerability Status updated