{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-38486","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2023-07-18T14:34:27.165Z","datePublished":"2023-09-06T17:48:38.025Z","dateUpdated":"2024-09-26T19:51:05.849Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"lessThanOrEqual":"<=10.4.0.1","status":"affected","version":"ArubaOS 10.4.x.x","versionType":"semver"},{"lessThanOrEqual":"<=8.11.1.0","status":"affected","version":"ArubaOS 8.11.x.x","versionType":"semver"},{"lessThanOrEqual":"<=8.10.0.6","status":"affected","version":"ArubaOS 8.10.x.x","versionType":"semver"},{"lessThanOrEqual":"<=8.6.0.21","status":"affected","version":"ArubaOS 8.6.x.x","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Nicholas Starke of Aruba Threat Labs"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A vulnerability in the secure boot implementation on affected&nbsp;Aruba 9200 and 9000 Series Controllers and Gateways allows&nbsp;an attacker to bypass security controls which would normally&nbsp;prohibit unsigned kernel images from executing. An attacker&nbsp;can use this vulnerability to execute arbitrary runtime&nbsp;operating systems, including unverified and unsigned OS&nbsp;images."}],"value":"A vulnerability in the secure boot implementation on affected Aruba 9200 and 9000 Series Controllers and Gateways allows an attacker to bypass security controls which would normally prohibit unsigned kernel images from executing. An attacker can use this vulnerability to execute arbitrary runtime operating systems, including unverified and unsigned OS images."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2023-09-06T17:48:38.025Z"},"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt"}],"source":{"discovery":"UNKNOWN"},"title":"Hardware Root of Trust Bypass in 9200 and 9000 Series Controllers and Gateways","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:39:13.554Z"},"title":"CVE Program Container","references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-863","lang":"en","description":"CWE-863 Incorrect Authorization"}]}],"affected":[{"vendor":"arubanetworks","product":"arubaos","cpes":["cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*"],"defaultStatus":"affected","versions":[{"version":"8.6.0.0","status":"affected","lessThan":"8.6.0.22","versionType":"semver"},{"version":"8.10.0.0","status":"affected","lessThan":"8.10.0.7","versionType":"semver"},{"version":"8.11.0.0","status":"affected","lessThan":"8.11.1.1","versionType":"semver"},{"version":"10.4.0.0","status":"affected","lessThan":"10.4.0.2","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-09-26T19:38:37.378313Z","id":"CVE-2023-38486","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-09-26T19:51:05.849Z"}}]}}