8.8
CVE-2023-35971
- EPSS 0.3%
- Published 05.07.2023 15:15:09
- Last modified 21.11.2024 08:09:05
- Source security-alert@hpe.com
- Teams watchlist Login
- Open Login
A vulnerability in the ArubaOS web-based management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Data is provided by the National Vulnerability Database (NVD)
Arubanetworks ≫ Arubaos Version >= 6.5.4.0 < 8.6.0.21
Arubanetworks ≫ Mc-va-10 Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Arubaos Version >= 8.7.0.0 < 8.10.0.7
Arubanetworks ≫ Mc-va-10 Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Arubaos Version >= 8.11.0.0 < 8.11.1.1
Arubanetworks ≫ Mc-va-10 Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Arubaos Version >= 10.4.0.0 < 10.4.0.2
Arubanetworks ≫ Mc-va-10 Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Arubanetworks ≫ Mc-va-1k Version-
Arubanetworks ≫ Mc-va-250 Version-
Arubanetworks ≫ Mc-va-50 Version-
Arubanetworks ≫ Mcr-va-10k Version-
Arubanetworks ≫ Mcr-va-1k Version-
Arubanetworks ≫ Mcr-va-50 Version-
Arubanetworks ≫ Mcr-va-500 Version-
Arubanetworks ≫ Mcr-va-5k Version-
Arubanetworks ≫ Sd-wan Version-
Arubanetworks ≫ Mcr-hw-10k Version-
Arubanetworks ≫ Mcr-hw-1k Version-
Arubanetworks ≫ Mcr-hw-5k Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.3% | 0.527 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.1 | 2.8 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
|
security-alert@hpe.com | 8.8 | 2.1 | 6 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H
|
CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.