Learn about CVE-2022-37902, an authenticated command injection vulnerability in Aruba Mobility Conductor, Controllers, and Gateways. Understand the impact, affected versions, and mitigation steps.
This article provides detailed information about CVE-2022-37902, an authenticated command injection vulnerability affecting Aruba Mobility Conductor, Mobility Controllers, and WLAN Gateways managed by Aruba Central.
Understanding CVE-2022-37902
CVE-2022-37902 is an authenticated command injection vulnerability found in the ArubaOS command line interface. Successful exploitation allows an attacker to execute arbitrary commands as a privileged user on the underlying operating system.
What is CVE-2022-37902?
CVE-2022-37902 is a high-severity vulnerability with a CVSSv3.1 base score of 7.2. The vulnerability impacts various versions of ArubaOS and SD-WAN Gateways managed by Aruba Central, potentially leading to unauthorized command execution.
The Impact of CVE-2022-37902
The impact of CVE-2022-37902 is significant, with high confidentiality, integrity, and availability impacts. Attackers with high privileges can exploit the vulnerability to compromise the affected systems and execute malicious commands.
Technical Details of CVE-2022-37902
CVE-2022-37902 is characterized by authenticated command injection vulnerabilities in the ArubaOS command line interface. Here are some technical details:
Vulnerability Description
The vulnerability allows authenticated attackers to inject and execute arbitrary commands on the affected systems, posing a serious security risk.
Affected Systems and Versions
The vulnerability affects various versions of ArubaOS, including 6.5.4.x, 8.6.x, 8.7.x, 8.10.x, 10.3.x, and SD-WAN-2.3.0.x managed by Aruba Central.
Exploitation Mechanism
Successful exploitation of CVE-2022-37902 requires authentication, but once exploited, attackers can execute commands with high privileges on the targeted systems.
Mitigation and Prevention
To safeguard your systems from CVE-2022-37902, consider the following mitigation strategies:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates