Vulnerability Details CVE-2023-39266
A vulnerability in the ArubaOS-Switch web management interface could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface provided certain configuration options are present. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 49.0%
CVSS Severity
CVSS v3 Score 8.3
Products affected by CVE-2023-39266
-
cpe:2.3:h:arubanetworks:aruba_2530:-
-
cpe:2.3:h:arubanetworks:aruba_2530ya:-
-
cpe:2.3:h:arubanetworks:aruba_2530yb:-
-
cpe:2.3:h:arubanetworks:aruba_2540:-
-
cpe:2.3:h:arubanetworks:aruba_2920:-
-
cpe:2.3:h:arubanetworks:aruba_2930f:-
-
cpe:2.3:h:arubanetworks:aruba_2930m:-
-
cpe:2.3:h:arubanetworks:aruba_3810m:-
-
cpe:2.3:h:arubanetworks:aruba_5406r_zl2:-
-
cpe:2.3:h:arubanetworks:aruba_5412r_zl2:-
-
cpe:2.3:o:hpe:arubaos-switch:-
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0004
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0005
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0006
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0007
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0008
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0009
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0010
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0011
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0012m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0013m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0014m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0015m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0016m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0017m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0018m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0019m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0020m
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0021
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0022
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0023
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0024
-
cpe:2.3:o:hpe:arubaos-switch:15.16.0026
-
cpe:2.3:o:hpe:arubaos-switch:16.01.0000
-
cpe:2.3:o:hpe:arubaos-switch:16.04.0026
-
cpe:2.3:o:hpe:arubaos-switch:16.04.0027
-
cpe:2.3:o:hpe:arubaos-switch:16.05.0000
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0001
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0002
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0003
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0004
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0005
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0006
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0007
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0008
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0009
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0010
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0011
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0012
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0013
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0014
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0015
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0026
-
cpe:2.3:o:hpe:arubaos-switch:16.08.0027
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0001
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0002
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0003
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0004
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0005
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0006
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0007
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0008
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0009
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0010
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0011
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0012
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0013
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0014
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0015
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0016
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0024
-
cpe:2.3:o:hpe:arubaos-switch:16.10.0025
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0001
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0002
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0003
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0004
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0005
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0006
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0007
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0012
-
cpe:2.3:o:hpe:arubaos-switch:16.11.0013