8.8
CVE-2023-3718
- EPSS 1.1%
- Veröffentlicht 01.08.2023 19:15:09
- Zuletzt bearbeitet 21.11.2024 08:17:54
- Quelle security-alert@hpe.com
- Teams Watchlist Login
- Unerledigt Login
An authenticated command injection vulnerability exists in the AOS-CX command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands on the underlying operating system as a privileged user on the affected switch. This allows an attacker to fully compromise the underlying operating system on the device running AOS-CX.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Hpe ≫ Arubaos-cx Version >= 10.10.0000 <= 10.10.1050
Hpe ≫ Aruba Cx 10000-48y6 Version-
Hpe ≫ Aruba Cx 4100i Version-
Hpe ≫ Aruba Cx 6000 12g Version-
Hpe ≫ Aruba Cx 6000 24g Version-
Hpe ≫ Aruba Cx 6000 48g Version-
Hpe ≫ Aruba Cx 6100 Version-
Hpe ≫ Aruba Cx 6200f Version-
Hpe ≫ Aruba Cx 6200f 48g Version-
Hpe ≫ Aruba Cx 6200m Version-
Hpe ≫ Aruba Cx 6200m 24g Version-
Hpe ≫ Aruba Cx 6300m 24p Version-
Hpe ≫ Aruba Cx 6300m 48g Version-
Hpe ≫ Aruba Cx 6405 Version-
Hpe ≫ Aruba Cx 6410 Version-
Hpe ≫ Aruba Cx 8320-32 Version-
Hpe ≫ Aruba Cx 8320-48p Version-
Hpe ≫ Aruba Cx 8325-32c Version-
Hpe ≫ Aruba Cx 8325-48y8c Version-
Hpe ≫ Aruba Cx 8360-12c Version-
Hpe ≫ Aruba Cx 8360-16y2c Version-
Hpe ≫ Aruba Cx 8360-24xf2c Version-
Hpe ≫ Aruba Cx 8360-32y4c Version-
Hpe ≫ Aruba Cx 8360-48xt4c Version-
Hpe ≫ Aruba Cx 8360-48y6c Version-
Hpe ≫ Aruba Cx 8400 Version-
Hpe ≫ Aruba Cx 9300 32d Version-
Hpe ≫ Aruba Cx 4100i Version-
Hpe ≫ Aruba Cx 6000 12g Version-
Hpe ≫ Aruba Cx 6000 24g Version-
Hpe ≫ Aruba Cx 6000 48g Version-
Hpe ≫ Aruba Cx 6100 Version-
Hpe ≫ Aruba Cx 6200f Version-
Hpe ≫ Aruba Cx 6200f 48g Version-
Hpe ≫ Aruba Cx 6200m Version-
Hpe ≫ Aruba Cx 6200m 24g Version-
Hpe ≫ Aruba Cx 6300m 24p Version-
Hpe ≫ Aruba Cx 6300m 48g Version-
Hpe ≫ Aruba Cx 6405 Version-
Hpe ≫ Aruba Cx 6410 Version-
Hpe ≫ Aruba Cx 8320-32 Version-
Hpe ≫ Aruba Cx 8320-48p Version-
Hpe ≫ Aruba Cx 8325-32c Version-
Hpe ≫ Aruba Cx 8325-48y8c Version-
Hpe ≫ Aruba Cx 8360-12c Version-
Hpe ≫ Aruba Cx 8360-16y2c Version-
Hpe ≫ Aruba Cx 8360-24xf2c Version-
Hpe ≫ Aruba Cx 8360-32y4c Version-
Hpe ≫ Aruba Cx 8360-48xt4c Version-
Hpe ≫ Aruba Cx 8360-48y6c Version-
Hpe ≫ Aruba Cx 8400 Version-
Hpe ≫ Aruba Cx 9300 32d Version-
Hpe ≫ Arubaos-cx Version >= 10.11.0000 <= 10.11.1010
Hpe ≫ Aruba Cx 10000-48y6 Version-
Hpe ≫ Aruba Cx 4100i Version-
Hpe ≫ Aruba Cx 6000 12g Version-
Hpe ≫ Aruba Cx 6000 24g Version-
Hpe ≫ Aruba Cx 6000 48g Version-
Hpe ≫ Aruba Cx 6100 Version-
Hpe ≫ Aruba Cx 6200f Version-
Hpe ≫ Aruba Cx 6200f 48g Version-
Hpe ≫ Aruba Cx 6200m Version-
Hpe ≫ Aruba Cx 6200m 24g Version-
Hpe ≫ Aruba Cx 6300m 24p Version-
Hpe ≫ Aruba Cx 6300m 48g Version-
Hpe ≫ Aruba Cx 6405 Version-
Hpe ≫ Aruba Cx 6410 Version-
Hpe ≫ Aruba Cx 8320-32 Version-
Hpe ≫ Aruba Cx 8320-48p Version-
Hpe ≫ Aruba Cx 8325-32c Version-
Hpe ≫ Aruba Cx 8325-48y8c Version-
Hpe ≫ Aruba Cx 8360-12c Version-
Hpe ≫ Aruba Cx 8360-16y2c Version-
Hpe ≫ Aruba Cx 8360-24xf2c Version-
Hpe ≫ Aruba Cx 8360-32y4c Version-
Hpe ≫ Aruba Cx 8360-48xt4c Version-
Hpe ≫ Aruba Cx 8360-48y6c Version-
Hpe ≫ Aruba Cx 8400 Version-
Hpe ≫ Aruba Cx 9300 32d Version-
Hpe ≫ Aruba Cx 4100i Version-
Hpe ≫ Aruba Cx 6000 12g Version-
Hpe ≫ Aruba Cx 6000 24g Version-
Hpe ≫ Aruba Cx 6000 48g Version-
Hpe ≫ Aruba Cx 6100 Version-
Hpe ≫ Aruba Cx 6200f Version-
Hpe ≫ Aruba Cx 6200f 48g Version-
Hpe ≫ Aruba Cx 6200m Version-
Hpe ≫ Aruba Cx 6200m 24g Version-
Hpe ≫ Aruba Cx 6300m 24p Version-
Hpe ≫ Aruba Cx 6300m 48g Version-
Hpe ≫ Aruba Cx 6405 Version-
Hpe ≫ Aruba Cx 6410 Version-
Hpe ≫ Aruba Cx 8320-32 Version-
Hpe ≫ Aruba Cx 8320-48p Version-
Hpe ≫ Aruba Cx 8325-32c Version-
Hpe ≫ Aruba Cx 8325-48y8c Version-
Hpe ≫ Aruba Cx 8360-12c Version-
Hpe ≫ Aruba Cx 8360-16y2c Version-
Hpe ≫ Aruba Cx 8360-24xf2c Version-
Hpe ≫ Aruba Cx 8360-32y4c Version-
Hpe ≫ Aruba Cx 8360-48xt4c Version-
Hpe ≫ Aruba Cx 8360-48y6c Version-
Hpe ≫ Aruba Cx 8400 Version-
Hpe ≫ Aruba Cx 9300 32d Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 1.1% | 0.768 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
security-alert@hpe.com | 8.8 | 2.8 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')
The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.