目標達成 すべての支援者に感謝 — 100%達成しました!

目標: 1000 CNY · 調達済み: 1000 CNY

100.0%

CVE-2023-22763— Aruba Networks ArubaOS 命令注入漏洞

CVSS 7.2 · High EPSS 1.68% · P82
新しい脆弱性情報の通知を購読するログインして購読

I. CVE-2023-22763の基本情報

脆弱性情報

脆弱性についてご質問がありますか?Shenlongの分析が参考になるかご確認ください!
Shenlongの10の質問を表示 ↗

高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。

脆弱性タイトル
Authenticated Remote Command Execution in the ArubaOS Command Line Interface
ソース: NVD (National Vulnerability Database)
脆弱性説明
Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities result in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
ソース: NVD (National Vulnerability Database)
CVSS情報
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
ソース: NVD (National Vulnerability Database)
脆弱性タイプ
N/A
ソース: NVD (National Vulnerability Database)
脆弱性タイトル
Aruba Networks ArubaOS 命令注入漏洞
ソース: CNNVD (China National Vulnerability Database)
脆弱性説明
Aruba Networks ArubaOS是美国安移通(Aruba Networks)公司的一套面向Aruba Mobility-Defined Networks(包括移动控制器和移动接入交换机)的操作系统。 Aruba Networks ArubaOS 存在安全漏洞,该漏洞源于 ArubaOS 命令行界面中存在经过身份验证的命令注入漏洞。
ソース: CNNVD (China National Vulnerability Database)
CVSS情報
N/A
ソース: CNNVD (China National Vulnerability Database)
脆弱性タイプ
N/A
ソース: CNNVD (China National Vulnerability Database)

影響を受ける製品

II. CVE-2023-22763の公開POC

#POC説明ソースリンクShenlongリンク
AI生成POCプレミアム

公開POCは見つかりませんでした。

ログインしてAI POCを生成

III. CVE-2023-22763のインテリジェンス情報

登录查看更多情报信息。

Same Patch Batch · Hewlett Packard Enterprise (HPE) · 2023-02-28 · 32 CVEs total

CVE-2023-227479.8 CRITICALMultiple Unauthenticated Command Injections in the PAPI Protocol
CVE-2023-227489.8 CRITICALMultiple Unauthenticated Command Injections in the PAPI Protocol
CVE-2023-227499.8 CRITICALMultiple Unauthenticated Command Injections in the PAPI Protocol
CVE-2023-227509.8 CRITICALMultiple Unauthenticated Command Injections in the PAPI Protocol
CVE-2023-227519.8 CRITICALUnauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol
CVE-2023-227529.8 CRITICALUnauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol
CVE-2023-227538.1 HIGHUnauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes
CVE-2023-227548.1 HIGHUnauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes
CVE-2023-227558.1 HIGHUnauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes
CVE-2023-227568.1 HIGHUnauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes
CVE-2023-227578.1 HIGHUnauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes
CVE-2023-227627.2 HIGHAuthenticated Remote Command Execution in the ArubaOS Command Line Interface
CVE-2023-227587.2 HIGHAuthenticated Remote Command Execution in ArubaOS Web-based Management Interface
CVE-2023-227597.2 HIGHAuthenticated Remote Command Execution in ArubaOS Web-based Management Interface
CVE-2023-227607.2 HIGHAuthenticated Remote Command Execution in ArubaOS Web-based Management Interface
CVE-2023-227617.2 HIGHAuthenticated Remote Command Execution in ArubaOS Web-based Management Interface
CVE-2023-227647.2 HIGHAuthenticated Remote Command Execution in the ArubaOS Command Line Interface
CVE-2023-227657.2 HIGHAuthenticated Remote Command Execution in the ArubaOS Command Line Interface
CVE-2023-227667.2 HIGHAuthenticated Remote Command Execution in the ArubaOS Command Line Interface
CVE-2023-227677.2 HIGHAuthenticated Remote Command Execution in the ArubaOS Command Line Interface

Showing 20 of 32 CVEs. View all on vendor page →

IV. 関連脆弱性

V. CVE-2023-22763へのコメント

まだコメントはありません


コメントを残す