CVE-2023-35979

There is an unauthenticated buffer overflow vulnerability in the process controlling the ArubaOS web-based management interface. Successful exploitation of this vulnerability results in a Denial-of-Service (DoS) condition affecting the web-based management interface of the controller.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*
OR cpe:2.3:a:arubanetworks:mc-va-10:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:mc-va-1k:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:mc-va-250:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:mc-va-50:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:mcr-va-10k:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:mcr-va-1k:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:mcr-va-50:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:mcr-va-500:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:mcr-va-5k:-:*:*:*:*:*:*:*
cpe:2.3:a:arubanetworks:sd-wan:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:mcr-hw-10k:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:mcr-hw-1k:-:*:*:*:*:*:*:*
cpe:2.3:h:arubanetworks:mcr-hw-5k:-:*:*:*:*:*:*:*

History

21 Nov 2024, 08:09

Type Values Removed Values Added
References () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt - Vendor Advisory () https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt - Vendor Advisory
CVSS v2 : unknown
v3 : 7.5
v2 : unknown
v3 : 5.3

Information

Published : 2023-07-05 15:15

Updated : 2024-11-21 08:09


NVD link : CVE-2023-35979

Mitre link : CVE-2023-35979

CVE.ORG link : CVE-2023-35979


JSON object : View

Products Affected

arubanetworks

  • arubaos
  • mc-va-250
  • mc-va-10
  • mc-va-1k
  • mc-va-50
  • mcr-va-1k
  • mcr-va-50
  • sd-wan
  • mcr-va-10k
  • mcr-hw-10k
  • mcr-hw-5k
  • mcr-va-500
  • mcr-va-5k
  • mcr-hw-1k
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')