CVE-2022-37889
CVSS V2 None
CVSS V3 Critical 9.8
Description
There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities.
Overview
- CVE ID
- CVE-2022-37889
- Assigner
- security-alert@hpe.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-10-07T18:15:21
- Last Modified Date
- 2022-11-09T03:59:42
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* | 1 | OR | 10.3.0.0 | 10.3.1.1 |
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* | 1 | OR | 6.4.0.0 | 6.4.4.8-4.2.4.21 |
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* | 1 | OR | 6.5.0.0 | 6.5.4.24 |
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* | 1 | OR | 8.6.0.0 | 8.6.0.19 |
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* | 1 | OR | 8.7.0.0 | 8.7.1.10 |
cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:* | 1 | OR | 8.10.0.0 | 8.10.0.2 |
AND | ||||
cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 9.8
- Base Severity
- CRITICAL
- Exploitability Score
- 3.9
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf | Third Party Advisory |
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-014.txt | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-37889 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-37889 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-10-07 19:00:20 | Added to TrackCVE | |||
2022-12-07 05:48:38 | 2022-10-07T18:15Z | 2022-10-07T18:15:21 | CVE Published Date | updated |
2022-12-07 05:48:38 | 2022-11-09T03:59:42 | CVE Modified Date | updated | |
2022-12-07 05:48:38 | Analyzed | Vulnerability Status | updated | |
2022-12-07 05:48:46 | References | updated |