A memory corruption vulnerability in ArubaOS-Switch could lead to unauthenticated remote code execution by receiving specially crafted packets. Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system.
The product writes data past the end, or before the beginning, of the intended buffer.
Link | Tags |
---|---|
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-013.txt | vendor advisory |