CVE-2022-37888

CRITICAL

Arubanetworks Arubaos < 10.3.1.1 - Buffer Overflow

Title source: rule
STIX 2.1

Description

There are buffer overflow vulnerabilities in multiple underlying services that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks AP management protocol) UDP port (8211). Successful exploitation of these vulnerabilities results in the ability to execute arbitrary code as a privileged user on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address these security vulnerabilities.

References (2)

Core 2

Scores

CVSS v3 9.8
EPSS 0.0115
EPSS Percentile 78.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-120
Status published
Products (3)
arubanetworks/arubaos 10.3.0.0 - 10.3.1.1
arubanetworks/instant 6.4.0.0 - 6.4.4.8-4.2.4.21
siemens/scalance_w1750d_firmware
Published Oct 06, 2022
Tracked Since Feb 18, 2026