CVE-2023-22765
📋 TL;DR
Authenticated command injection vulnerabilities in ArubaOS CLI allow attackers with valid credentials to execute arbitrary commands as privileged users on the underlying OS. This affects Aruba networking devices running vulnerable ArubaOS versions, potentially compromising network infrastructure.
💻 Affected Systems
- Aruba Mobility Controllers
- Aruba Gateways
- Aruba SD-WAN Gateways
📦 What is this software?
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Sd Wan by Arubanetworks
⚠️ Risk & Real-World Impact
Worst Case
Complete network compromise: attacker gains root access to network devices, can intercept/modify traffic, deploy malware, pivot to other systems, and cause widespread service disruption.
Likely Case
Network device compromise leading to traffic interception, configuration changes, credential theft, and lateral movement within the network.
If Mitigated
Limited impact due to strong access controls, network segmentation, and monitoring preventing successful exploitation or containing damage.
🎯 Exploit Status
Requires valid credentials. Once authenticated, exploitation is straightforward command injection.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ArubaOS 10.5.1.0, 8.11.2.0, 8.10.0.9, 6.5.4.24 (and later)
Vendor Advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt
Restart Required: Yes
Instructions:
1. Download appropriate patch from Aruba support portal. 2. Backup configuration. 3. Apply patch following ArubaOS upgrade procedures. 4. Reboot device. 5. Verify patch installation.
🔧 Temporary Workarounds
Restrict CLI Access
allLimit CLI access to trusted management networks and specific administrative IPs
configure terminal
management-access-profile <profile-name>
management-access-ip <trusted-ip>
apply profile to interfaces
Implement Strong Authentication
allEnforce multi-factor authentication and strong password policies for CLI access
aaa authentication login default local
aaa authorization exec default local
enable password encryption
🧯 If You Can't Patch
- Implement strict network segmentation to isolate management interfaces
- Enforce principle of least privilege for CLI user accounts and monitor for suspicious activity
🔍 How to Verify
Check if Vulnerable:
Check ArubaOS version via CLI: 'show version' and compare to vulnerable versions in advisory
Check Version:
show version
Verify Fix Applied:
Verify installed version is patched: 'show version' should show 10.5.1.0+, 8.11.2.0+, 8.10.0.9+, or 6.5.4.24+
📡 Detection & Monitoring
Log Indicators:
- Unusual CLI command patterns
- Multiple failed authentication attempts followed by successful login
- Commands with shell metacharacters in CLI logs
Network Indicators:
- Unexpected outbound connections from network devices
- Anomalous traffic patterns from management interfaces
SIEM Query:
source="aruba_device" AND (event_type="cli_command" AND command MATCHES "[|;&$()]" OR auth_success AFTER multiple_auth_failures)