// For flags

CVE-2022-37892

 

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Aruba InstantOS and ArubaOS 10 web management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface. A successful exploit could allow an attacker to execute arbitrary script code in a victim’s browser in the context of the affected interface of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InnstantOS that address this security vulnerability.

Una vulnerabilidad en la interfaz de administración web de Aruba InstantOS y ArubaOS versión 10 ,podría permitir a un atacante remoto no autenticado conducir un ataque de tipo cross-site scripting (XSS) almacenado contra un usuario de la interfaz. Una explotación con éxito podría permitir a un atacante ejecutar código de script arbitrario en el navegador de una víctima en el contexto de la interfaz afectada de Aruba InstantOS versiones 6.4.x: 6.4.4.8-4.2.4.20 y anteriores; Aruba InstantOS 6.5.x: 6.5.4.23 y anteriores; Aruba InstantOS 8. 6.x: 8.6.0.18 y anteriores; Aruba InstantOS 8.7.x: 8.7.1.9 y anteriores; Aruba InstantOS 8.10.x: 8.10.0.1 y anteriores; ArubaOS 10.3.x: 10.3.1.0 y anteriores; Aruba ha publicado actualizaciones para Aruba InstantOS que abordan esta vulnerabilidad de seguridad

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2022-08-08 CVE Reserved
  • 2022-10-07 CVE Published
  • 2024-04-29 EPSS Updated
  • 2024-08-03 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Siemens
Search vendor "Siemens"
Scalance W1750d Firmware
Search vendor "Siemens" for product "Scalance W1750d Firmware"
*-
Affected
in Siemens
Search vendor "Siemens"
Scalance W1750d
Search vendor "Siemens" for product "Scalance W1750d"
--
Safe
Arubanetworks
Search vendor "Arubanetworks"
Arubaos
Search vendor "Arubanetworks" for product "Arubaos"
>= 10.3.0.0 < 10.3.1.1
Search vendor "Arubanetworks" for product "Arubaos" and version " >= 10.3.0.0 < 10.3.1.1"
-
Affected
Arubanetworks
Search vendor "Arubanetworks"
Instant
Search vendor "Arubanetworks" for product "Instant"
>= 6.4.0.0 < 6.4.4.8-4.2.4.21
Search vendor "Arubanetworks" for product "Instant" and version " >= 6.4.0.0 < 6.4.4.8-4.2.4.21"
-
Affected
Arubanetworks
Search vendor "Arubanetworks"
Instant
Search vendor "Arubanetworks" for product "Instant"
>= 6.5.0.0 < 6.5.4.24
Search vendor "Arubanetworks" for product "Instant" and version " >= 6.5.0.0 < 6.5.4.24"
-
Affected
Arubanetworks
Search vendor "Arubanetworks"
Instant
Search vendor "Arubanetworks" for product "Instant"
>= 8.6.0.0 < 8.6.0.19
Search vendor "Arubanetworks" for product "Instant" and version " >= 8.6.0.0 < 8.6.0.19"
-
Affected
Arubanetworks
Search vendor "Arubanetworks"
Instant
Search vendor "Arubanetworks" for product "Instant"
>= 8.7.0.0 < 8.7.1.10
Search vendor "Arubanetworks" for product "Instant" and version " >= 8.7.0.0 < 8.7.1.10"
-
Affected
Arubanetworks
Search vendor "Arubanetworks"
Instant
Search vendor "Arubanetworks" for product "Instant"
>= 8.10.0.0 < 8.10.0.2
Search vendor "Arubanetworks" for product "Instant" and version " >= 8.10.0.0 < 8.10.0.2"
-
Affected