CVE-2023-22765

7.2 HIGH

📋 TL;DR

Authenticated command injection vulnerabilities in ArubaOS CLI allow attackers with valid credentials to execute arbitrary commands as privileged users on the underlying OS. This affects Aruba networking devices running vulnerable ArubaOS versions, potentially compromising network infrastructure.

💻 Affected Systems

Products:
  • Aruba Mobility Controllers
  • Aruba Gateways
  • Aruba SD-WAN Gateways
Versions: ArubaOS 10.x, 8.x, 6.x (specific versions in vendor advisory)
Operating Systems: ArubaOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated CLI access. All configurations with CLI enabled are vulnerable if running affected versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete network compromise: attacker gains root access to network devices, can intercept/modify traffic, deploy malware, pivot to other systems, and cause widespread service disruption.

🟠

Likely Case

Network device compromise leading to traffic interception, configuration changes, credential theft, and lateral movement within the network.

🟢

If Mitigated

Limited impact due to strong access controls, network segmentation, and monitoring preventing successful exploitation or containing damage.

🌐 Internet-Facing: MEDIUM - Only affects devices with CLI exposed to internet (uncommon), but if exposed, high impact.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain privileged access to network infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires valid credentials. Once authenticated, exploitation is straightforward command injection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ArubaOS 10.5.1.0, 8.11.2.0, 8.10.0.9, 6.5.4.24 (and later)

Vendor Advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt

Restart Required: Yes

Instructions:

1. Download appropriate patch from Aruba support portal. 2. Backup configuration. 3. Apply patch following ArubaOS upgrade procedures. 4. Reboot device. 5. Verify patch installation.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to trusted management networks and specific administrative IPs

configure terminal
management-access-profile <profile-name>
management-access-ip <trusted-ip>
apply profile to interfaces

Implement Strong Authentication

all

Enforce multi-factor authentication and strong password policies for CLI access

aaa authentication login default local
aaa authorization exec default local
enable password encryption

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate management interfaces
  • Enforce principle of least privilege for CLI user accounts and monitor for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check ArubaOS version via CLI: 'show version' and compare to vulnerable versions in advisory

Check Version:

show version

Verify Fix Applied:

Verify installed version is patched: 'show version' should show 10.5.1.0+, 8.11.2.0+, 8.10.0.9+, or 6.5.4.24+

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command patterns
  • Multiple failed authentication attempts followed by successful login
  • Commands with shell metacharacters in CLI logs

Network Indicators:

  • Unexpected outbound connections from network devices
  • Anomalous traffic patterns from management interfaces

SIEM Query:

source="aruba_device" AND (event_type="cli_command" AND command MATCHES "[|;&$()]" OR auth_success AFTER multiple_auth_failures)

🔗 References

📤 Share & Export