Known Vulnerabilities for Cx 6000 by Arubanetworks

Listed below are 10 of the newest known vulnerabilities associated with "Cx 6000" by "Arubanetworks".

These CVEs are retrieved based on exact matches on listed software, hardware, and vendor information (CPE data) as well as a keyword search to ensure the newest vulnerabilities with no officially listed software information are still displayed.

Data on known vulnerable versions is also displayed based on information from known CPEs

Known Vulnerabilities

CVE Shortened Description Severity Publish Date Last Modified
CVE-2022-23689 Multiple vulnerabilities exist in the processing of packet data by the LLDP service of AOS-CX. Successful exploitation of the... 4.3 - MEDIUM 2022-09-06 2023-08-08
CVE-2022-23688 Multiple vulnerabilities exist in the processing of packet data by the LLDP service of AOS-CX. Successful exploitation of the... 4.3 - MEDIUM 2022-09-06 2023-08-08
CVE-2022-23687 Multiple vulnerabilities exist in the processing of packet data by the LLDP service of AOS-CX. Successful exploitation of the... 4.3 - MEDIUM 2022-09-06 2023-08-08
CVE-2022-23686 Multiple vulnerabilities exist in the processing of packet data by the LLDP service of AOS-CX. Successful exploitation of the... 4.3 - MEDIUM 2022-09-06 2023-08-08
CVE-2022-23684 A vulnerability in the web-based management interface of AOS-CX could allow a remote authenticated user with read-only privil... 8.8 - HIGH 2022-09-06 2022-09-12
CVE-2022-23683 Authenticated command injection vulnerabilities exist in the AOS-CX Network Analytics Engine via NAE scripts. Successful expl... 7.2 - HIGH 2022-09-06 2022-09-12
CVE-2022-23682 Multiple vulnerabilities exist in the AOS-CX command line interface that could lead to authenticated command injection. A suc... 7.8 - HIGH 2022-09-06 2022-09-12
CVE-2022-23681 Multiple vulnerabilities exist in the AOS-CX command line interface that could lead to authenticated command injection. A suc... 7.8 - HIGH 2022-09-06 2022-09-12
CVE-2022-23680 AOS-CX lacks Anti-CSRF protections in place for state-changing operations. This can potentially be exploited by an attacker t... 8.8 - HIGH 2022-09-06 2022-09-12
CVE-2022-23679 AOS-CX lacks Anti-CSRF protections in place for state-changing operations. This can potentially be exploited by an attacker t... 8.8 - HIGH 2022-09-06 2022-09-13

Popular searches for Cx 6000

Aruba CX 6000 Switch Series Data Sheet

www.arubanetworks.com/resource/aruba-cx-6000-switch-series-data-sheet

Aruba CX 6000 Switch Series Data Sheet This data sheet describes key features, supported standards and specifications for the Aruba CX 6000 J H F Switch Series ideal for enterprise branch offices, campuses and SMBs.

www.arubanetworks.com/ja/resource/aruba-cx-6000-switch-series-data-sheet www.arubanetworks.com/en-gb/resource/aruba-cx-6000-switch-series-data-sheet www.arubanetworks.com/sea/resource/aruba-cx-6000-switch-series-data-sheet www.arubanetworks.com/br/resource/aruba-cx-6000-switch-series-data-sheet www.arubanetworks.com/de/resource/aruba-cx-6000-switch-series-data-sheet www.arubanetworks.com/it/resource/aruba-cx-6000-switch-series-data-sheet www.arubanetworks.com/es/resource/aruba-cx-6000-switch-series-data-sheet www.arubanetworks.com/en-in/resource/aruba-cx-6000-switch-series-data-sheet www.arubanetworks.com/zh-hans/resource/aruba-cx-6000-switch-series-data-sheet Hewlett Packard Enterprise Aruba Customer experience Data Datasheet Small and medium-sized enterprises Switch X86 Specification (technical standard) Financial services Network switch Technical standard Enterprise software Analytics Nintendo Switch Computer network Wireless access point Business Technology Data center

© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report