{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<ul> <li>ArubaOS versions 8.6.x.x ant\u00e9rieures \u00e0 8.6.0.21</li> <li>ArubaOS versions 8.10.x.x ant\u00e9rieures \u00e0 8.10.0.7</li> <li>ArubaOS versions 8.11.x.x ant\u00e9rieures \u00e0 8.11.1.1</li> <li>ArubaOS versions 10.4.x.x ant\u00e9rieures \u00e0 10.4.0.2</li> </ul> <p>&nbsp;</p> <p>Par ailleurs, l'\u00e9diteur mentionne une liste de versions en fin de support pour les logiciels ArubaOS et SD-WAN. Ces versions sont vuln\u00e9rables et ne feront donc pas l'objet d'un correctif :</p> <ul> <li>ArubaOS versions 8.9.x.x</li> <li>ArubaOS versions 8.8.x.x</li> <li>ArubaOS versions 8.7.x.x</li> <li>ArubaOS versions 6.5.4.x</li> <li>SD-WAN versions 8.7.0.0-2.3.0.x</li> <li>SD-WAN versions 8.6.0.4-2.2.x.x</li> </ul> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-35974","url":"https://www.cve.org/CVERecord?id=CVE-2023-35974"},{"name":"CVE-2023-35976","url":"https://www.cve.org/CVERecord?id=CVE-2023-35976"},{"name":"CVE-2023-35972","url":"https://www.cve.org/CVERecord?id=CVE-2023-35972"},{"name":"CVE-2023-35978","url":"https://www.cve.org/CVERecord?id=CVE-2023-35978"},{"name":"CVE-2023-35973","url":"https://www.cve.org/CVERecord?id=CVE-2023-35973"},{"name":"CVE-2023-35971","url":"https://www.cve.org/CVERecord?id=CVE-2023-35971"},{"name":"CVE-2023-35979","url":"https://www.cve.org/CVERecord?id=CVE-2023-35979"},{"name":"CVE-2023-35975","url":"https://www.cve.org/CVERecord?id=CVE-2023-35975"},{"name":"CVE-2023-35977","url":"https://www.cve.org/CVERecord?id=CVE-2023-35977"}],"links":[],"reference":"CERTFR-2023-AVI-0520","revisions":[{"description":"Version initiale","revision_date":"2023-07-10T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Aruba ArubaOS.\nCertaines d'entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Aruba ArubaOS","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2023-008 du 11 juillet 2023","url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt"}]}
