CVE-2023-35976 (GCVE-0-2023-35976)
Vulnerability from cvelistv5 – Published: 2023-07-05 14:47 – Updated: 2024-12-04 15:39
VLAI?
Title
Authenticated Sensitive Information Disclosure in ArubaOS Command Line Interface
Summary
Vulnerabilities exist which allow an authenticated attacker to access sensitive information on the ArubaOS command line interface. Successful exploitation could allow access to data beyond what is authorized by the users existing privilege level.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central |
Affected:
- ArubaOS 10.4.x.x: 10.4.0.1 and below
Affected: - ArubaOS 8.11.x.x: 8.11.1.0 and below Affected: - ArubaOS 8.10.x.x: 8.10.0.6 and below Affected: - ArubaOS 8.6.x.x: 8.6.0.20 and below |
Credits
Erik de Jong (bugcrowd.com/erikdejong)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T16:37:40.669Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-35976",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-04T15:38:41.712067Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-04T15:39:11.162Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"status": "affected",
"version": "- ArubaOS 10.4.x.x: 10.4.0.1 and below"
},
{
"status": "affected",
"version": "- ArubaOS 8.11.x.x: 8.11.1.0 and below"
},
{
"status": "affected",
"version": "- ArubaOS 8.10.x.x: 8.10.0.6 and below"
},
{
"status": "affected",
"version": "- ArubaOS 8.6.x.x: 8.6.0.20 and below"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Erik de Jong (bugcrowd.com/erikdejong)"
}
],
"datePublic": "2023-07-11T19:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Vulnerabilities exist which allow an authenticated attacker\u0026nbsp;to access sensitive information on the ArubaOS command line\u0026nbsp;interface. Successful exploitation could allow access to data\u0026nbsp;beyond what is authorized by the users existing privilege\u0026nbsp;level."
}
],
"value": "Vulnerabilities exist which allow an authenticated attacker\u00a0to access sensitive information on the ArubaOS command line\u00a0interface. Successful exploitation could allow access to data\u00a0beyond what is authorized by the users existing privilege\u00a0level."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-07-05T14:47:43.236Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Sensitive Information Disclosure in ArubaOS Command Line Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-35976",
"datePublished": "2023-07-05T14:47:43.236Z",
"dateReserved": "2023-06-20T18:41:22.737Z",
"dateUpdated": "2024-12-04T15:39:11.162Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"6.5.4.0\", \"versionEndExcluding\": \"8.6.0.21\", \"matchCriteriaId\": \"F16AFF8F-596A-4153-8529-36AD2E142066\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.7.0.0\", \"versionEndExcluding\": \"8.10.0.7\", \"matchCriteriaId\": \"DC566921-54C3-4368-A7FB-1F68F964975C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"8.11.0.0\", \"versionEndExcluding\": \"8.11.1.1\", \"matchCriteriaId\": \"A22E7E61-B318-47C8-8C72-498A17031997\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"10.4.0.0\", \"versionEndExcluding\": \"10.4.0.2\", \"matchCriteriaId\": \"6418722E-304A-46EF-8D9E-EB42596F0DFC\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mc-va-10:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51A31372-168E-4182-BFE0-440403454DC5\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F519E5CF-474B-4564-9DC4-AE6FC58A48A7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mc-va-250:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51478694-008E-47A4-B8AF-497BA81EC80D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mc-va-50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A10EF4D1-35E8-41BB-8453-19F0F3623D25\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FA5AF43C-F2E3-44E7-B4E3-AC315B0B0DB2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"276FF1F2-7353-4AF4-8BDA-8B78B5DCF688\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EBCAB5D5-EB6D-460A-A8C7-0A2A9E813776\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"413B049C-8B7F-4BAC-8170-2BF3B0EEA43F\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F87B24FC-9C99-4CF7-9481-74686E48E800\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:arubanetworks:sd-wan:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47E812E5-4476-4335-97D7-3D0E2A5E9E9B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:mcr-hw-10k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CA9CA7B-AC2C-408A-B759-E2F4778B20ED\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:mcr-hw-1k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"38A42369-3558-4015-AF7B-7F2E2465AE61\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:arubanetworks:mcr-hw-5k:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0D8DDC4-17FB-4A9D-BB01-E8C130B04ED2\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Vulnerabilities exist which allow an authenticated attacker\\u00a0to access sensitive information on the ArubaOS command line\\u00a0interface. Successful exploitation could allow access to data\\u00a0beyond what is authorized by the users existing privilege\\u00a0level.\"}]",
"id": "CVE-2023-35976",
"lastModified": "2024-11-21T08:09:05.690",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-alert@hpe.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
"published": "2023-07-05T15:15:09.650",
"references": "[{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt\", \"source\": \"security-alert@hpe.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security-alert@hpe.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-35976\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2023-07-05T15:15:09.650\",\"lastModified\":\"2024-11-21T08:09:05.690\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Vulnerabilities exist which allow an authenticated attacker\u00a0to access sensitive information on the ArubaOS command line\u00a0interface. Successful exploitation could allow access to data\u00a0beyond what is authorized by the users existing privilege\u00a0level.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-alert@hpe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.5.4.0\",\"versionEndExcluding\":\"8.6.0.21\",\"matchCriteriaId\":\"F16AFF8F-596A-4153-8529-36AD2E142066\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.7.0.0\",\"versionEndExcluding\":\"8.10.0.7\",\"matchCriteriaId\":\"DC566921-54C3-4368-A7FB-1F68F964975C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.11.0.0\",\"versionEndExcluding\":\"8.11.1.1\",\"matchCriteriaId\":\"A22E7E61-B318-47C8-8C72-498A17031997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.4.0.0\",\"versionEndExcluding\":\"10.4.0.2\",\"matchCriteriaId\":\"6418722E-304A-46EF-8D9E-EB42596F0DFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mc-va-10:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A31372-168E-4182-BFE0-440403454DC5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F519E5CF-474B-4564-9DC4-AE6FC58A48A7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mc-va-250:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51478694-008E-47A4-B8AF-497BA81EC80D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mc-va-50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A10EF4D1-35E8-41BB-8453-19F0F3623D25\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA5AF43C-F2E3-44E7-B4E3-AC315B0B0DB2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"276FF1F2-7353-4AF4-8BDA-8B78B5DCF688\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBCAB5D5-EB6D-460A-A8C7-0A2A9E813776\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"413B049C-8B7F-4BAC-8170-2BF3B0EEA43F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F87B24FC-9C99-4CF7-9481-74686E48E800\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:arubanetworks:sd-wan:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47E812E5-4476-4335-97D7-3D0E2A5E9E9B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:mcr-hw-10k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CA9CA7B-AC2C-408A-B759-E2F4778B20ED\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:mcr-hw-1k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38A42369-3558-4015-AF7B-7F2E2465AE61\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:mcr-hw-5k:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0D8DDC4-17FB-4A9D-BB01-E8C130B04ED2\"}]}]}],\"references\":[{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T16:37:40.669Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-35976\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-04T15:38:41.712067Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-04T15:39:03.452Z\"}}], \"cna\": {\"title\": \"Authenticated Sensitive Information Disclosure in ArubaOS Command Line Interface\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Erik de Jong (bugcrowd.com/erikdejong)\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Hewlett Packard Enterprise (HPE)\", \"product\": \"Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central\", \"versions\": [{\"status\": \"affected\", \"version\": \"- ArubaOS 10.4.x.x: 10.4.0.1 and below\"}, {\"status\": \"affected\", \"version\": \"- ArubaOS 8.11.x.x: 8.11.1.0 and below\"}, {\"status\": \"affected\", \"version\": \"- ArubaOS 8.10.x.x: 8.10.0.6 and below\"}, {\"status\": \"affected\", \"version\": \"- ArubaOS 8.6.x.x: 8.6.0.20 and below\"}], \"defaultStatus\": \"affected\"}], \"datePublic\": \"2023-07-11T19:00:00.000Z\", \"references\": [{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"Vulnerabilities exist which allow an authenticated attacker\\u00a0to access sensitive information on the ArubaOS command line\\u00a0interface. Successful exploitation could allow access to data\\u00a0beyond what is authorized by the users existing privilege\\u00a0level.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Vulnerabilities exist which allow an authenticated attacker\u0026nbsp;to access sensitive information on the ArubaOS command line\u0026nbsp;interface. Successful exploitation could allow access to data\u0026nbsp;beyond what is authorized by the users existing privilege\u0026nbsp;level.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"eb103674-0d28-4225-80f8-39fb86215de0\", \"shortName\": \"hpe\", \"dateUpdated\": \"2023-07-05T14:47:43.236Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-35976\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-04T15:39:11.162Z\", \"dateReserved\": \"2023-06-20T18:41:22.737Z\", \"assignerOrgId\": \"eb103674-0d28-4225-80f8-39fb86215de0\", \"datePublished\": \"2023-07-05T14:47:43.236Z\", \"assignerShortName\": \"hpe\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…