CRITICAL · 9.8

CVE-2022-37890

Unauthenticated buffer overflow vulnerabilities exist within the Aruba InstantOS and ArubaOS 10 web management interface. Successful exploitation results in the execution of arbitrary commands on the ...

Vulnerability Description

Unauthenticated buffer overflow vulnerabilities exist within the Aruba InstantOS and ArubaOS 10 web management interface. Successful exploitation results in the execution of arbitrary commands on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities.

CVSS Score

9.8

CRITICAL

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Affected Products

VendorProductVersions
ArubanetworksArubaos>= 10.3.0.0, < 10.3.1.1
ArubanetworksInstant>= 6.4.0.0, < 6.4.4.8-4.2.4.21
SiemensScalance W1750D Firmware-
SiemensScalance W1750D-

Related Weaknesses (CWE)

References

FAQ

What is CVE-2022-37890?

CVE-2022-37890 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Unauthenticated buffer overflow vulnerabilities exist within the Aruba InstantOS and ArubaOS 10 web management interface. Successful exploitation results in the execution of arbitrary commands on the ...

How severe is CVE-2022-37890?

CVE-2022-37890 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.

Is there a patch for CVE-2022-37890?

Check the references section above for vendor advisories and patch information. Affected products include: Arubanetworks Arubaos, Arubanetworks Instant, Siemens Scalance W1750D Firmware, Siemens Scalance W1750D.