Show plain JSON{"configurations": [{"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*", "matchCriteriaId": "F1B6376E-424F-4DBF-B00D-69C52E4B3E46", "versionEndExcluding": "10.3.1.1", "versionStartIncluding": "10.3.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*", "matchCriteriaId": "D27F5A7C-442F-45A6-A149-2037042A1629", "versionEndExcluding": "6.4.4.8-4.2.4.21", "versionStartIncluding": "6.4.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*", "matchCriteriaId": "6A33DE52-E905-4EBD-BA56-1DC67B7DD9FD", "versionEndExcluding": "6.5.4.24", "versionStartIncluding": "6.5.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*", "matchCriteriaId": "081502CC-38D4-46F9-85D0-3D1F701D5EE4", "versionEndExcluding": "8.6.0.19", "versionStartIncluding": "8.6.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*", "matchCriteriaId": "BEA3846D-54C5-4B92-86B6-6AC482C2B357", "versionEndExcluding": "8.7.1.10", "versionStartIncluding": "8.7.0.0", "vulnerable": true}, {"criteria": "cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*", "matchCriteriaId": "B32D91E1-3034-4E05-8FBA-98EF4562F3FE", "versionEndExcluding": "8.10.0.2", "versionStartIncluding": "8.10.0.0", "vulnerable": true}], "negate": false, "operator": "OR"}]}, {"nodes": [{"cpeMatch": [{"criteria": "cpe:2.3:o:siemens:scalance_w1750d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "065280B2-6EC1-4721-B3D7-EDE44ED4F5BD", "vulnerable": true}], "negate": false, "operator": "OR"}, {"cpeMatch": [{"criteria": "cpe:2.3:h:siemens:scalance_w1750d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBC30055-239F-4BB1-B2D1-E5E35F0D8911", "vulnerable": false}], "negate": false, "operator": "OR"}], "operator": "AND"}], "descriptions": [{"lang": "en", "value": "An authenticated command injection vulnerability exists in the Aruba InstantOS and ArubaOS 10 command line interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InstantOS that address this security vulnerability."}, {"lang": "es", "value": "Se presenta una vulnerabilidad de inyecci\u00f3n de comandos autenticados en la interfaz de l\u00ednea de comandos de Aruba InstantOS y ArubaOS versi\u00f3n 10. Una explotaci\u00f3n con \u00e9xito de esta vulnerabilidad resulta en la capacidad de ejecutar comandos arbitrarios como un usuario privilegiado en el sistema operativo subyacente de Aruba InstantOS versiones 6.4.x: 6.4.4.8-4.2.4.20 y anteriores; Aruba InstantOS 6.5.x: 6.5.4. 23 y siguientes; Aruba InstantOS 8.6.x: 8.6.0.18 y siguientes; Aruba InstantOS 8.7.x: 8.7.1.9 y siguientes; Aruba InstantOS 8.10.x: 8.10.0.1 y siguientes; ArubaOS 10.3.x: 10.3.1.0 y siguientes; Aruba ha publicado actualizaciones para Aruba InstantOS que solucionan esta vulnerabilidad de seguridad"}], "id": "CVE-2022-37893", "lastModified": "2024-11-21T07:15:19.560", "metrics": {"cvssMetricV31": [{"cvssData": {"attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary"}]}, "published": "2022-10-07T19:15:12.597", "references": [{"source": "security-alert@hpe.com", "tags": ["Third Party Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf"}, {"source": "security-alert@hpe.com", "tags": ["Vendor Advisory"], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-014.txt"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Third Party Advisory"], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-506569.pdf"}, {"source": "af854a3a-2127-422b-91ae-364da2661108", "tags": ["Vendor Advisory"], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-014.txt"}], "sourceIdentifier": "security-alert@hpe.com", "vulnStatus": "Modified", "weaknesses": [{"description": [{"lang": "en", "value": "CWE-78"}], "source": "nvd@nist.gov", "type": "Primary"}]}