CVE-2023-38486 (GCVE-0-2023-38486)
Vulnerability from cvelistv5 – Published: 2023-09-06 17:48 – Updated: 2024-09-26 19:51
VLAI?
Title
Hardware Root of Trust Bypass in 9200 and 9000 Series Controllers and Gateways
Summary
A vulnerability in the secure boot implementation on affected Aruba 9200 and 9000 Series Controllers and Gateways allows an attacker to bypass security controls which would normally prohibit unsigned kernel images from executing. An attacker can use this vulnerability to execute arbitrary runtime operating systems, including unverified and unsigned OS images.
Severity ?
7.7 (High)
CWE
- CWE-863 - Incorrect Authorization
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | 9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways |
Affected:
ArubaOS 10.4.x.x , ≤ <=10.4.0.1
(semver)
Affected: ArubaOS 8.11.x.x , ≤ <=8.11.1.0 (semver) Affected: ArubaOS 8.10.x.x , ≤ <=8.10.0.6 (semver) Affected: ArubaOS 8.6.x.x , ≤ <=8.6.0.21 (semver) |
Credits
Nicholas Starke of Aruba Threat Labs
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:39:13.554Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.22",
"status": "affected",
"version": "8.6.0.0",
"versionType": "semver"
},
{
"lessThan": "8.10.0.7",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
},
{
"lessThan": "8.11.1.1",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
},
{
"lessThan": "10.4.0.2",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-38486",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-26T19:38:37.378313Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-863",
"description": "CWE-863 Incorrect Authorization",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-09-26T19:51:05.849Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=10.4.0.1",
"status": "affected",
"version": "ArubaOS 10.4.x.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.11.1.0",
"status": "affected",
"version": "ArubaOS 8.11.x.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.6",
"status": "affected",
"version": "ArubaOS 8.10.x.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.6.0.21",
"status": "affected",
"version": "ArubaOS 8.6.x.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Nicholas Starke of Aruba Threat Labs"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability in the secure boot implementation on affected\u0026nbsp;Aruba 9200 and 9000 Series Controllers and Gateways allows\u0026nbsp;an attacker to bypass security controls which would normally\u0026nbsp;prohibit unsigned kernel images from executing. An attacker\u0026nbsp;can use this vulnerability to execute arbitrary runtime\u0026nbsp;operating systems, including unverified and unsigned OS\u0026nbsp;images."
}
],
"value": "A vulnerability in the secure boot implementation on affected\u00a0Aruba 9200 and 9000 Series Controllers and Gateways allows\u00a0an attacker to bypass security controls which would normally\u00a0prohibit unsigned kernel images from executing. An attacker\u00a0can use this vulnerability to execute arbitrary runtime\u00a0operating systems, including unverified and unsigned OS\u00a0images."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-09-06T17:48:38.025Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Hardware Root of Trust Bypass in 9200 and 9000 Series Controllers and Gateways",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-38486",
"datePublished": "2023-09-06T17:48:38.025Z",
"dateReserved": "2023-07-18T14:34:27.165Z",
"dateUpdated": "2024-09-26T19:51:05.849Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-38486\",\"sourceIdentifier\":\"security-alert@hpe.com\",\"published\":\"2023-09-06T18:15:08.547\",\"lastModified\":\"2024-11-21T08:13:40.187\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the secure boot implementation on affected\u00a0Aruba 9200 and 9000 Series Controllers and Gateways allows\u00a0an attacker to bypass security controls which would normally\u00a0prohibit unsigned kernel images from executing. An attacker\u00a0can use this vulnerability to execute arbitrary runtime\u00a0operating systems, including unverified and unsigned OS\u00a0images.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en la implementaci\u00f3n de arranque seguro en los Controladores y Gateways de las Series Aruba 9200 y 9000 afectados permite a un atacante eludir los controles de seguridad que normalmente prohibir\u00edan la ejecuci\u00f3n de im\u00e1genes del kernel sin firmar. Un atacante puede utilizar esta vulnerabilidad para ejecutar sistemas operativos en tiempo de ejecuci\u00f3n arbitrarios, incluidas im\u00e1genes de sistema operativo no verificadas y sin firmar.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-alert@hpe.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N\",\"baseScore\":7.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.3,\"impactScore\":5.8},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.4,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.5,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-863\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.6.0.0\",\"versionEndExcluding\":\"8.6.0.22\",\"matchCriteriaId\":\"ADB9BE64-9455-46B2-80C8-BD9B88A8F372\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.10.0.0\",\"versionEndExcluding\":\"8.10.0.7\",\"matchCriteriaId\":\"48293E3F-C6BD-4875-8C7A-67ED41B7C18D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.11.0.0\",\"versionEndExcluding\":\"8.11.1.1\",\"matchCriteriaId\":\"A22E7E61-B318-47C8-8C72-498A17031997\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"10.4.0.0\",\"versionEndExcluding\":\"10.4.0.2\",\"matchCriteriaId\":\"6418722E-304A-46EF-8D9E-EB42596F0DFC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CFA13FF5-7C60-48B4-AF46-18A9F19D5D42\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B1EB3D9-77B5-4DBE-9518-23DD0DA06BC9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17162DB3-973E-47C6-9157-39A0E94603F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:arubanetworks:9240:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6BF9E0D-630F-40B4-9109-560CA13C981B\"}]}]}],\"references\":[{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt\",\"source\":\"security-alert@hpe.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T17:39:13.554Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-38486\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-26T19:38:37.378313Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*\"], \"vendor\": \"arubanetworks\", \"product\": \"arubaos\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.6.0.0\", \"lessThan\": \"8.6.0.22\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"8.10.0.0\", \"lessThan\": \"8.10.0.7\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"8.11.0.0\", \"lessThan\": \"8.11.1.1\", \"versionType\": \"semver\"}, {\"status\": \"affected\", \"version\": \"10.4.0.0\", \"lessThan\": \"10.4.0.2\", \"versionType\": \"semver\"}], \"defaultStatus\": \"affected\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-863\", \"description\": \"CWE-863 Incorrect Authorization\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-26T19:44:49.150Z\"}}], \"cna\": {\"title\": \"Hardware Root of Trust Bypass in 9200 and 9000 Series Controllers and Gateways\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"user\": \"00000000-0000-4000-9000-000000000000\", \"value\": \"Nicholas Starke of Aruba Threat Labs\"}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 7.7, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Hewlett Packard Enterprise (HPE)\", \"product\": \"9200 Series Mobility Controllers and SD-WAN Gateways, 9000 Series Mobility Controllers and SD-WAN Gateways\", \"versions\": [{\"status\": \"affected\", \"version\": \"ArubaOS 10.4.x.x\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"\u003c=10.4.0.1\"}, {\"status\": \"affected\", \"version\": \"ArubaOS 8.11.x.x\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"\u003c=8.11.1.0\"}, {\"status\": \"affected\", \"version\": \"ArubaOS 8.10.x.x\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"\u003c=8.10.0.6\"}, {\"status\": \"affected\", \"version\": \"ArubaOS 8.6.x.x\", \"versionType\": \"semver\", \"lessThanOrEqual\": \"\u003c=8.6.0.21\"}], \"defaultStatus\": \"affected\"}], \"references\": [{\"url\": \"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the secure boot implementation on affected\\u00a0Aruba 9200 and 9000 Series Controllers and Gateways allows\\u00a0an attacker to bypass security controls which would normally\\u00a0prohibit unsigned kernel images from executing. An attacker\\u00a0can use this vulnerability to execute arbitrary runtime\\u00a0operating systems, including unverified and unsigned OS\\u00a0images.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"A vulnerability in the secure boot implementation on affected\u0026nbsp;Aruba 9200 and 9000 Series Controllers and Gateways allows\u0026nbsp;an attacker to bypass security controls which would normally\u0026nbsp;prohibit unsigned kernel images from executing. An attacker\u0026nbsp;can use this vulnerability to execute arbitrary runtime\u0026nbsp;operating systems, including unverified and unsigned OS\u0026nbsp;images.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"eb103674-0d28-4225-80f8-39fb86215de0\", \"shortName\": \"hpe\", \"dateUpdated\": \"2023-09-06T17:48:38.025Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-38486\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-09-26T19:51:05.849Z\", \"dateReserved\": \"2023-07-18T14:34:27.165Z\", \"assignerOrgId\": \"eb103674-0d28-4225-80f8-39fb86215de0\", \"datePublished\": \"2023-09-06T17:48:38.025Z\", \"assignerShortName\": \"hpe\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…