Vulnerability Description
A memory corruption vulnerability in ArubaOS-Switch could lead to unauthenticated remote code execution by receiving specially crafted packets. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hpe | Arubaos-Switch | < a.15.16.0026 |
| Arubanetworks | Aruba 2530 | - |
| Arubanetworks | Aruba 2530Ya | - |
| Arubanetworks | Aruba 2530Yb | - |
| Arubanetworks | Aruba 2540 | - |
| Arubanetworks | Aruba 2920 | - |
| Arubanetworks | Aruba 2930F | - |
| Arubanetworks | Aruba 2930M | - |
| Arubanetworks | Aruba 3810M | - |
| Arubanetworks | Aruba 5406R Zl2 | - |
| Arubanetworks | Aruba 5412R Zl2 | - |
Related Weaknesses (CWE)
References
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-013.txtVendor Advisory
- https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-013.txtVendor Advisory
FAQ
What is CVE-2023-39268?
CVE-2023-39268 is a vulnerability with a CVSS score of 4.5 (MEDIUM). A memory corruption vulnerability in ArubaOS-Switch could lead to unauthenticated remote code execution by receiving specially crafted packets. Successful exploitation of this vulnerability results in...
How severe is CVE-2023-39268?
CVE-2023-39268 has been rated MEDIUM with a CVSS base score of 4.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-39268?
Check the references section above for vendor advisories and patch information. Affected products include: Hpe Arubaos-Switch, Arubanetworks Aruba 2530, Arubanetworks Aruba 2530Ya, Arubanetworks Aruba 2530Yb, Arubanetworks Aruba 2540.