There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system.
References
Link | Resource |
---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: hpe
Published: 2023-02-28T16:09:16.831Z
Updated: 2023-03-01T05:45:13.020935Z
Reserved: 2023-01-06T15:24:20.503Z
Link: CVE-2023-22750
JSON object: View
NVD Information
Status : Modified
Published: 2023-03-01T08:15:12.620
Modified: 2023-11-07T04:07:20.317
Link: CVE-2023-22750
JSON object: View
Redhat Information
No data.
CWE