CVE-2023-22748 – Multiple Unauthenticated Command Injections in the PAPI Protocol
https://notcve.org/view.php?id=CVE-2023-22748
There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2023-22747 – Multiple Unauthenticated Command Injections in the PAPI Protocol
https://notcve.org/view.php?id=CVE-2023-22747
There are multiple command injection vulnerabilities that could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba Networks access point management protocol) UDP port (8211). Successful exploitation of these vulnerabilities result in the ability to execute arbitrary code as a privileged user on the underlying operating system. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •
CVE-2022-43540
https://notcve.org/view.php?id=CVE-2022-43540
A vulnerability exists in the ClearPass OnGuard macOS agent that allows for an attacker with local macOS instance access to potentially obtain sensitive information. A successful exploit could allow an attacker to retrieve information that is of a sensitive nature in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below. Existe una vulnerabilidad en el agente ClearPass OnGuard macOS que permite a un atacante con acceso a una instancia local de macOS obtener información confidencial. Un exploit exitoso podría permitir a un atacante recuperar información de naturaleza confidencial en las versiones de Aruba ClearPass Policy Manager: ClearPass Policy Manager 6.10.x: 6.10.7 y anteriores y ClearPass Policy Manager 6.9.x: 6.9.12 y abajo. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt •
CVE-2022-43539
https://notcve.org/view.php?id=CVE-2022-43539
A vulnerability exists in the ClearPass Policy Manager cluster communications that allow for an attacker in a privileged network position to potentially obtain sensitive information. A successful exploit could allow an attacker to retrieve information that allows for unauthorized actions as a privileged user on the ClearPass Policy Manager cluster in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below. Existe una vulnerabilidad en las comunicaciones del clúster de ClearPass Policy Manager que permite que un atacante en una posición privilegiada de la red obtenga información confidencial. Un exploit exitoso podría permitir a un atacante recuperar información que permita acciones no autorizadas como usuario privilegiado en el clúster de ClearPass Policy Manager en las versiones de Aruba ClearPass Policy Manager: ClearPass Policy Manager 6.10.x: 6.10.7 y anteriores y ClearPass Policy Manager 6.9.x: 6.9.12 y anteriores. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt •
CVE-2022-43538
https://notcve.org/view.php?id=CVE-2022-43538
Vulnerabilities in the ClearPass Policy Manager web-based management interface allow remote authenticated users to run arbitrary commands on the underlying host. Successful exploits could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba ClearPass Policy Manager version(s): ClearPass Policy Manager 6.10.x: 6.10.7 and below and ClearPass Policy Manager 6.9.x: 6.9.12 and below. Las vulnerabilidades en la interfaz de administración basada en web de ClearPass Policy Manager permiten a usuarios remotos autenticados ejecutar comandos arbitrarios en el host subyacente. Los exploits exitosos podrían permitir a un atacante ejecutar comandos arbitrarios como root en el sistema operativo subyacente, lo que llevaría a comprometer completamente el sistema en las versiones de Aruba ClearPass Policy Manager: ClearPass Policy Manager 6.10.x: 6.10.7 y anteriores y ClearPass Policy Manager 6.9. x: 6.9.12 y anteriores. • https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-020.txt • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •