{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T05:19:31.623","vulnerabilities":[{"cve":{"id":"CVE-2023-38485","sourceIdentifier":"security-alert@hpe.com","published":"2023-09-06T18:15:08.480","lastModified":"2024-11-21T08:13:40.053","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerabilities exist in the BIOS implementation of Aruba 9200 and 9000 Series Controllers and Gateways that could allow an attacker to execute arbitrary code early in the boot sequence. An attacker could exploit this vulnerability to gain access to and change underlying sensitive information in the affected controller leading to complete system compromise."},{"lang":"es","value":"Existen vulnerabilidades en la implementación del BIOS de los Controladores y Gateways de las Series 9200 y 9000 de Aruba que podrían permitir a un atacante ejecutar código arbitrario en las primeras etapas de la secuencia de inicio. Un atacante podría aprovechar esta vulnerabilidad para obtener acceso y cambiar información sensible subyacente en el controlador afectado, lo que comprometería completamente el sistema."}],"metrics":{"cvssMetricV31":[{"source":"security-alert@hpe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H","baseScore":8.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.3,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.4,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.5,"impactScore":5.9}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"8.6.0.0","versionEndExcluding":"8.6.0.22","matchCriteriaId":"ADB9BE64-9455-46B2-80C8-BD9B88A8F372"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"8.10.0.0","versionEndExcluding":"8.10.0.7","matchCriteriaId":"48293E3F-C6BD-4875-8C7A-67ED41B7C18D"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"8.11.0.0","versionEndExcluding":"8.11.1.1","matchCriteriaId":"A22E7E61-B318-47C8-8C72-498A17031997"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.4.0.0","versionEndExcluding":"10.4.0.2","matchCriteriaId":"6418722E-304A-46EF-8D9E-EB42596F0DFC"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9004:-:*:*:*:*:*:*:*","matchCriteriaId":"CFA13FF5-7C60-48B4-AF46-18A9F19D5D42"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9004-lte:-:*:*:*:*:*:*:*","matchCriteriaId":"0B1EB3D9-77B5-4DBE-9518-23DD0DA06BC9"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9012:-:*:*:*:*:*:*:*","matchCriteriaId":"17162DB3-973E-47C6-9157-39A0E94603F2"},{"vulnerable":false,"criteria":"cpe:2.3:h:arubanetworks:9240:-:*:*:*:*:*:*:*","matchCriteriaId":"A6BF9E0D-630F-40B4-9109-560CA13C981B"}]}]}],"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt","source":"security-alert@hpe.com","tags":["Vendor Advisory"]},{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-014.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}