{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-22776","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2023-01-06T15:24:20.509Z","datePublished":"2023-02-28T17:02:51.772Z","dateUpdated":"2025-03-07T20:43:45.356Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"status":"affected","version":"ArubaOS 8.6.x.x:  8.6.0.19 and below"},{"status":"affected","version":"ArubaOS 8.10.x.x:   8.10.0.4 and below"},{"status":"affected","version":"ArubaOS 10.3.x.x:  10.3.1.0 and below"},{"status":"affected","version":"SD-WAN 8.7.0.0-2.3.0.x:  8.7.0.0-2.3.0.8 and below"}]}],"credits":[{"lang":"en","type":"reporter","user":"00000000-0000-4000-9000-000000000000","value":"Nicholas Starke of Aruba Threat Labs"}],"datePublic":"2023-02-28T21:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to read arbitrary files on the underlying operating system, including sensitive system files.<br>"}],"value":"An authenticated path traversal vulnerability exists in the ArubaOS command line interface. Successful exploitation of this vulnerability results in the ability to read arbitrary files on the underlying operating system, including sensitive system files.\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.9,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2023-03-01T05:45:13.020Z"},"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt"}],"source":{"discovery":"UNKNOWN"},"title":"Authenticated Remote Path Traversal in ArubaOS Command Line Interface Allows for Arbitrary File Read","x_generator":{"engine":"Vulnogram 0.1.0-dev"},"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T10:20:30.370Z"},"title":"CVE Program Container","references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-002.txt","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-22","lang":"en","description":"CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-03-07T20:43:31.253007Z","id":"CVE-2023-22776","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-07T20:43:45.356Z"}}]}}