Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2023-2120
Vulnerability from csaf_certbund
Published
2023-08-22 22:00
Modified
2023-08-22 22:00
Summary
Aruba EdgeConnect SD-WAN Orchestrator: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Aruba EdgeConnect ist eine SD-WAN-Produktfamilie für Unternehmenskunden.
Angriff
Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Aruba EdgeConnect SD-WAN Orchestrator ausnutzen, um einen Cross-Site Scripting Angriff durchzuführen, um Informationen offenzulegen und zu manipulieren und um die Kontrolle über das System zu übernehmen.
Betroffene Betriebssysteme
- UNIX
- Sonstiges
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Aruba EdgeConnect ist eine SD-WAN-Produktfamilie f\u00fcr Unternehmenskunden.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Aruba EdgeConnect SD-WAN Orchestrator ausnutzen, um einen Cross-Site Scripting Angriff durchzuf\u00fchren, um Informationen offenzulegen und zu manipulieren und um die Kontrolle \u00fcber das System zu \u00fcbernehmen.", "title": "Angriff" }, { "category": "general", "text": "- UNIX\n- Sonstiges", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-2120 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2120.json" }, { "category": "self", "summary": "WID-SEC-2023-2120 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2120" }, { "category": "external", "summary": "HPE Aruba Networking Product Security Advisory vom 2023-08-22", "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source_lang": "en-US", "title": "Aruba EdgeConnect SD-WAN Orchestrator: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-08-22T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:57:20.810+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2023-2120", "initial_release_date": "2023-08-22T22:00:00.000+00:00", "revision_history": [ { "date": "2023-08-22T22:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Aruba EdgeConnect SD-WAN Orchestrator \u003c 9.3.1", "product": { "name": "Aruba EdgeConnect SD-WAN Orchestrator \u003c 9.3.1", "product_id": "T029460", "product_identification_helper": { "cpe": "cpe:/a:aruba:edgeconnect:9.3.1::sd-wan_orchestrator" } } } ], "category": "vendor", "name": "Aruba" } ] }, "vulnerabilities": [ { "cve": "CVE-2023-37440", "notes": [ { "category": "description", "text": "Es gibt eine Schwachstelle in der webbasierten Verwaltungsschnittstelle von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, anonymer Angreifer kann Server-Side Request Forgery (SSRF)-Angriffe durchf\u00fchren, um Informationen \u00fcber die interne Struktur zu erhalten." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37440" }, { "cve": "CVE-2023-37438", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37438" }, { "cve": "CVE-2023-37437", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37437" }, { "cve": "CVE-2023-37436", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37436" }, { "cve": "CVE-2023-37435", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37435" }, { "cve": "CVE-2023-37434", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37434" }, { "cve": "CVE-2023-37433", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37433" }, { "cve": "CVE-2023-37432", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37432" }, { "cve": "CVE-2023-37431", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37431" }, { "cve": "CVE-2023-37430", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37430" }, { "cve": "CVE-2023-37429", "notes": [ { "category": "description", "text": "Es bestehen mehrere Schwachstellen in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann diese Probleme ausnutzen, um SQL-Injection-Angriffe durchzuf\u00fchren und vertrauliche Informationen zu erhalten und zu \u00e4ndern." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37429" }, { "cve": "CVE-2023-37428", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann dies ausnutzen, um beliebige Befehle auf dem zugrunde liegenden Hostsystem als \"root\" auszuf\u00fchren, was zu einer vollst\u00e4ndigen Kompromittierung des betroffenen Systems f\u00fchrt. Aruba legt keine weiteren Details zu dieser Schwachstelle offen." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37428" }, { "cve": "CVE-2023-37427", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in der webbasierten Verwaltungsoberfl\u00e4che von Aruba EdgeConnect SD-WAN Orchestrator. Ein entfernter, authentifizierter Angreifer kann dies ausnutzen, um beliebige Befehle auf dem zugrunde liegenden Hostsystem als \"root\" auszuf\u00fchren, was zu einer vollst\u00e4ndigen Kompromittierung des betroffenen Systems f\u00fchrt. Aruba legt keine weiteren Details zu dieser Schwachstelle offen." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37427" }, { "cve": "CVE-2023-37426", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Aruba EdgeConnect SD-WAN Orchestrator. Alle Installationen verwenden denselben statischen SSH-Hostschl\u00fcssel. Dadurch kann ein Angreifer die SSH-Hostsignatur f\u00e4lschen und sich so als legitimer Orchestrator-Host ausgeben." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37426" }, { "cve": "CVE-2023-37424", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in der webbasierten Verwaltungsschnittstelle von Aruba EdgeConnect SD-WAN Orchestrator, wenn bestimmte Voraussetzungen au\u00dferhalb der Kontrolle des Angreifers erf\u00fcllt sind. Ein entfernter, anonymer Angreifer kann dies ausnutzen, um beliebige Befehle auf dem zugrunde liegenden Hostsystem auszuf\u00fchren, was zu einer vollst\u00e4ndigen Kompromittierung des betroffenen Systems f\u00fchrt. Aruba legt keine weiteren Details zu dieser Schwachstelle offen." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37424" }, { "cve": "CVE-2023-37439", "notes": [ { "category": "description", "text": "Im Aruba EdgeConnect SD-WAN Orchestrator Web Administration Interface existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer oder authentisierter Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37439" }, { "cve": "CVE-2023-37425", "notes": [ { "category": "description", "text": "Im Aruba EdgeConnect SD-WAN Orchestrator Web Administration Interface existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer oder authentisierter Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37425" }, { "cve": "CVE-2023-37423", "notes": [ { "category": "description", "text": "Im Aruba EdgeConnect SD-WAN Orchestrator Web Administration Interface existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer oder authentisierter Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37423" }, { "cve": "CVE-2023-37422", "notes": [ { "category": "description", "text": "Im Aruba EdgeConnect SD-WAN Orchestrator Web Administration Interface existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer oder authentisierter Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37422" }, { "cve": "CVE-2023-37421", "notes": [ { "category": "description", "text": "Im Aruba EdgeConnect SD-WAN Orchestrator Web Administration Interface existieren mehrere Cross-Site Scripting Schwachstellen. HTML und Script-Eingaben werden nicht ordnungsgem\u00e4\u00df \u00fcberpr\u00fcft, bevor sie an den Benutzer zur\u00fcckgegeben werden. Ein entfernter, anonymer oder authentisierter Angreifer kann durch Ausnutzung dieser Schwachstellen beliebigen HTML- und Script-Code durch den Browser des Benutzers im Kontext der betroffenen Seite ausf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "release_date": "2023-08-22T22:00:00.000+00:00", "title": "CVE-2023-37421" } ] }
cve-2023-37424
Vulnerability from cvelistv5
Published
2023-08-22 17:59
Modified
2024-10-03 15:20
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an unauthenticated remote attacker to run arbitrary commands on the underlying host if certain preconditions outside of the attacker's control are met. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.442Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1.7", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2.5", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37424", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:17:11.927582Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:20:46.719Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability in the web-based management interface\u0026nbsp;of EdgeConnect SD-WAN Orchestrator could allow an\u0026nbsp;unauthenticated remote attacker to run arbitrary commands on\u0026nbsp;the underlying host if certain preconditions outside of the\u0026nbsp;attacker\u0027s control are met. Successful exploitation of this\u0026nbsp;vulnerability could allow an attacker to execute arbitrary\u0026nbsp;commands on the underlying operating system leading to\u0026nbsp;complete system compromise." } ], "value": "A vulnerability in the web-based management interface\u00a0of EdgeConnect SD-WAN Orchestrator could allow an\u00a0unauthenticated remote attacker to run arbitrary commands on\u00a0the underlying host if certain preconditions outside of the\u00a0attacker\u0027s control are met. Successful exploitation of this\u00a0vulnerability could allow an attacker to execute arbitrary\u00a0commands on the underlying operating system leading to\u00a0complete system compromise." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T17:59:26.532Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unauthenticated Remote Code Execution in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37424", "datePublished": "2023-08-22T17:59:26.532Z", "dateReserved": "2023-07-05T17:36:47.997Z", "dateUpdated": "2024-10-03T15:20:46.719Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37426
Vulnerability from cvelistv5
Published
2023-08-22 18:02
Modified
2024-10-03 15:04
Severity ?
EPSS score ?
Summary
EdgeConnect SD-WAN Orchestrator instances prior to the versions resolved in this advisory were found to have shared static SSH host keys for all installations. This vulnerability could allow an attacker to spoof the SSH host signature and thereby masquerade as a legitimate Orchestrator
host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.531Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1.7", "status": "affected", "version": "9.1x", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.2.5", "status": "affected", "version": "9.2x", "versionType": "semver" } ] }, { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37426", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T14:55:28.579141Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:04:38.699Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Dean Freeman" }, { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Carmody Rauch" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "EdgeConnect SD-WAN Orchestrator instances prior to the\u0026nbsp;versions resolved in this advisory were found to have\u0026nbsp;shared static SSH host keys for all installations. This\u0026nbsp;vulnerability could allow an attacker to spoof the SSH host\u0026nbsp;signature and thereby masquerade as a legitimate Orchestrator\u003cbr\u003ehost." } ], "value": "EdgeConnect SD-WAN Orchestrator instances prior to the\u00a0versions resolved in this advisory were found to have\u00a0shared static SSH host keys for all installations. This\u00a0vulnerability could allow an attacker to spoof the SSH host\u00a0signature and thereby masquerade as a legitimate Orchestrator\nhost." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:02:22.824Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Shared SSH Static Host Keys in EdgeConnect SD-WAN Orchestrator", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37426", "datePublished": "2023-08-22T18:02:22.824Z", "dateReserved": "2023-07-05T17:36:47.997Z", "dateUpdated": "2024-10-03T15:04:38.699Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37436
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-04 15:48
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37436", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T15:44:55.230674Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T15:48:23.055Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:25.585Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37436", "datePublished": "2023-08-22T18:08:25.585Z", "dateReserved": "2023-07-05T17:36:47.998Z", "dateUpdated": "2024-10-04T15:48:23.055Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37423
Vulnerability from cvelistv5
Published
2023-08-22 17:57
Modified
2024-10-03 15:21
Severity ?
EPSS score ?
Summary
Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.504Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37423", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:21:39.500700Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:21:54.991Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated\u0026nbsp;remote attacker to conduct a stored cross-site scripting\u0026nbsp;(XSS) attack against an administrative user of the interface.\u0026nbsp;A successful exploit allows an attacker to execute arbitrary\u0026nbsp;script code in a victim\u0027s browser in the context of the\u0026nbsp;affected interface." } ], "value": "Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated\u00a0remote attacker to conduct a stored cross-site scripting\u00a0(XSS) attack against an administrative user of the interface.\u00a0A successful exploit allows an attacker to execute arbitrary\u00a0script code in a victim\u0027s browser in the context of the\u00a0affected interface." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T17:57:30.109Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated Stored Cross-Site Scripting Vulnerabilities (XSS) in EdgeConnect SD-WAN Orchestrator Web Administration Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37423", "datePublished": "2023-08-22T17:57:30.109Z", "dateReserved": "2023-07-05T17:36:47.996Z", "dateUpdated": "2024-10-03T15:21:54.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37425
Vulnerability from cvelistv5
Published
2023-08-22 18:01
Modified
2024-10-03 15:15
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an unauthenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.452Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37425", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:14:40.433395Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:15:23.972Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability in the web-based management interface\u0026nbsp;of EdgeConnect SD-WAN Orchestrator could allow an\u0026nbsp;unauthenticated remote attacker to conduct a stored\u0026nbsp;cross-site scripting (XSS) attack against an administrative\u0026nbsp;user of the interface. A successful exploit allows an\u0026nbsp;attacker to execute arbitrary script code in a victim\u0027s\u0026nbsp;browser in the context of the affected interface." } ], "value": "A vulnerability in the web-based management interface\u00a0of EdgeConnect SD-WAN Orchestrator could allow an\u00a0unauthenticated remote attacker to conduct a stored\u00a0cross-site scripting (XSS) attack against an administrative\u00a0user of the interface. A successful exploit allows an\u00a0attacker to execute arbitrary script code in a victim\u0027s\u00a0browser in the context of the affected interface." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:01:03.060Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Unauthenticated Stored Cross-Site Scripting Vulnerability (XSS) in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37425", "datePublished": "2023-08-22T18:01:03.060Z", "dateReserved": "2023-07-05T17:36:47.997Z", "dateUpdated": "2024-10-03T15:15:23.972Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37437
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-03 14:21
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:30.088Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37437", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T14:18:49.562770Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T14:21:24.724Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:28.560Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37437", "datePublished": "2023-08-22T18:08:28.560Z", "dateReserved": "2023-07-05T17:36:47.998Z", "dateUpdated": "2024-10-03T14:21:24.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37439
Vulnerability from cvelistv5
Published
2023-08-22 18:09
Modified
2024-10-29 19:16
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.530Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37439", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-02T15:02:24.461658Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-922", "description": "CWE-922 Insecure Storage of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-29T19:16:16.550Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:09:38.208Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Reflected Cross Site Scripting in EdgeConnect SD-WAN Orchestrator Web Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37439", "datePublished": "2023-08-22T18:09:38.208Z", "dateReserved": "2023-07-05T17:36:47.999Z", "dateUpdated": "2024-10-29T19:16:16.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37431
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-03 14:25
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.558Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2X", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37431", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T14:23:36.628813Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T14:25:32.604Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:14.679Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37431", "datePublished": "2023-08-22T18:08:04.472Z", "dateReserved": "2023-07-05T17:36:47.998Z", "dateUpdated": "2024-10-03T14:25:32.604Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37434
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-04 15:56
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37434", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T15:53:08.313338Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T15:56:14.997Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:17.910Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37434", "datePublished": "2023-08-22T18:08:17.910Z", "dateReserved": "2023-07-05T17:36:47.998Z", "dateUpdated": "2024-10-04T15:56:14.997Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37438
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-03 14:16
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.966Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37438", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T14:11:24.698521Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T14:16:57.194Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:32.465Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37438", "datePublished": "2023-08-22T18:08:32.465Z", "dateReserved": "2023-07-05T17:36:47.999Z", "dateUpdated": "2024-10-03T14:16:57.194Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37435
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-04 15:51
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.529Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37435", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T15:48:50.990192Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T15:51:02.673Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:21.918Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37435", "datePublished": "2023-08-22T18:08:21.918Z", "dateReserved": "2023-07-05T17:36:47.998Z", "dateUpdated": "2024-10-04T15:51:02.673Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37430
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-03 14:41
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.471Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37430", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T14:36:46.334538Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T14:41:00.162Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:01.717Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37430", "datePublished": "2023-08-22T18:08:01.717Z", "dateReserved": "2023-07-05T17:36:47.997Z", "dateUpdated": "2024-10-03T14:41:00.162Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37440
Vulnerability from cvelistv5
Published
2023-08-22 18:10
Modified
2024-10-29 19:17
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an unauthenticated remote attacker to conduct a server-side request forgery (SSRF) attack. A successful exploit allows an attacker to enumerate information about the internal
structure of the EdgeConnect SD-WAN Orchestrator host leading to potential disclosure of sensitive information.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.502Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37440", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-01T15:20:08.877260Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-918", "description": "CWE-918 Server-Side Request Forgery (SSRF)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-29T19:17:30.370Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability in the web-based management interface\u0026nbsp;of EdgeConnect SD-WAN Orchestrator could allow an\u0026nbsp;unauthenticated remote attacker to conduct a server-side\u0026nbsp;request forgery (SSRF) attack. A successful exploit allows\u0026nbsp;an attacker to enumerate information about the internal\u003cbr\u003e\u0026nbsp; \u0026nbsp; structure of the EdgeConnect SD-WAN Orchestrator host leading\u0026nbsp;to potential disclosure of sensitive information.\u003cbr\u003e\u003cbr\u003e" } ], "value": "A vulnerability in the web-based management interface\u00a0of EdgeConnect SD-WAN Orchestrator could allow an\u00a0unauthenticated remote attacker to conduct a server-side\u00a0request forgery (SSRF) attack. A successful exploit allows\u00a0an attacker to enumerate information about the internal\n\u00a0 \u00a0 structure of the EdgeConnect SD-WAN Orchestrator host leading\u00a0to potential disclosure of sensitive information.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:10:43.522Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated Server-Side Request Forgery (SSRF) Leading to Information Disclosure", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37440", "datePublished": "2023-08-22T18:10:43.522Z", "dateReserved": "2023-07-05T17:36:47.999Z", "dateUpdated": "2024-10-29T19:17:30.370Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37421
Vulnerability from cvelistv5
Published
2023-08-22 17:57
Modified
2024-10-03 19:35
Severity ?
EPSS score ?
Summary
Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.468Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37421", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T19:34:40.824086Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T19:35:36.448Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated\u0026nbsp;remote attacker to conduct a stored cross-site scripting\u0026nbsp;(XSS) attack against an administrative user of the interface.\u0026nbsp;A successful exploit allows an attacker to execute arbitrary\u0026nbsp;script code in a victim\u0027s browser in the context of the\u0026nbsp;affected interface." } ], "value": "Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated\u00a0remote attacker to conduct a stored cross-site scripting\u00a0(XSS) attack against an administrative user of the interface.\u00a0A successful exploit allows an attacker to execute arbitrary\u00a0script code in a victim\u0027s browser in the context of the\u00a0affected interface." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T17:57:19.127Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated Stored Cross-Site Scripting Vulnerabilities (XSS) in EdgeConnect SD-WAN Orchestrator Web Administration Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37421", "datePublished": "2023-08-22T17:57:19.127Z", "dateReserved": "2023-07-05T17:36:47.995Z", "dateUpdated": "2024-10-03T19:35:36.448Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37428
Vulnerability from cvelistv5
Published
2023-08-22 18:04
Modified
2024-10-03 14:48
Severity ?
EPSS score ?
Summary
A vulnerability in the EdgeConnect SD-WAN Orchestrator web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.573Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1.7", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2.5", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37428", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T14:45:59.634603Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T14:48:07.190Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability in the EdgeConnect SD-WAN Orchestrator\u0026nbsp;web-based management interface allows remote authenticated\u0026nbsp;users to run arbitrary commands on the underlying host.\u0026nbsp;A successful exploit could allow an attacker to execute\u0026nbsp;arbitrary commands as root on the underlying operating system\u0026nbsp;leading to complete system compromise." } ], "value": "A vulnerability in the EdgeConnect SD-WAN Orchestrator\u00a0web-based management interface allows remote authenticated\u00a0users to run arbitrary commands on the underlying host.\u00a0A successful exploit could allow an attacker to execute\u00a0arbitrary commands as root on the underlying operating system\u00a0leading to complete system compromise." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:04:50.122Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated Remote Code Execution via Path Traversal in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37428", "datePublished": "2023-08-22T18:04:50.122Z", "dateReserved": "2023-07-05T17:36:47.997Z", "dateUpdated": "2024-10-03T14:48:07.190Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37429
Vulnerability from cvelistv5
Published
2023-08-22 18:07
Modified
2024-10-03 14:45
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.487Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9,2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37429", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T14:42:14.931742Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T14:45:14.356Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:07:58.022Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37429", "datePublished": "2023-08-22T18:07:58.022Z", "dateReserved": "2023-07-05T17:36:47.997Z", "dateUpdated": "2024-10-03T14:45:14.356Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37432
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-04 16:03
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.501Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37432", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T16:00:09.877411Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T16:03:15.265Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:07.446Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37432", "datePublished": "2023-08-22T18:08:07.446Z", "dateReserved": "2023-07-05T17:36:47.998Z", "dateUpdated": "2024-10-04T16:03:15.265Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37433
Vulnerability from cvelistv5
Published
2023-08-22 18:08
Modified
2024-10-04 15:59
Severity ?
EPSS score ?
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.* Version: Orchestrator 9.1.x ≤ <=9.1.* |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.494Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1*", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2*", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37433", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-04T15:56:52.612495Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-04T15:59:29.442Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.*", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.*", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:08:11.685Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37433", "datePublished": "2023-08-22T18:08:11.685Z", "dateReserved": "2023-07-05T17:36:47.998Z", "dateUpdated": "2024-10-04T15:59:29.442Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37427
Vulnerability from cvelistv5
Published
2023-08-22 18:03
Modified
2024-10-03 14:51
Severity ?
EPSS score ?
Summary
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.565Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "edgeconnect_sd-wan_orchestrator", "vendor": "hpe", "versions": [ { "lessThanOrEqual": "9.1.7", "status": "affected", "version": "9.1x", "versionType": "semver" }, { "lessThanOrEqual": "9.2.5", "status": "affected", "version": "9.2x", "versionType": "semver" }, { "lessThanOrEqual": "9.3.0", "status": "affected", "version": "9.3x", "versionType": "semver" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-37427", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T14:49:06.698612Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-94", "description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-03T14:51:40.904Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A vulnerability in the web-based management interface of\u0026nbsp;EdgeConnect SD-WAN Orchestrator could allow an authenticated\u0026nbsp;remote attacker to run arbitrary commands on the underlying\u0026nbsp;host. Successful exploitation of this vulnerability allows\u0026nbsp;an attacker to execute arbitrary commands as root on the\u0026nbsp;underlying operating system leading to complete system\u0026nbsp;compromise." } ], "value": "A vulnerability in the web-based management interface of\u00a0EdgeConnect SD-WAN Orchestrator could allow an authenticated\u00a0remote attacker to run arbitrary commands on the underlying\u00a0host. Successful exploitation of this vulnerability allows\u00a0an attacker to execute arbitrary commands as root on the\u00a0underlying operating system leading to complete system\u00a0compromise." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T18:05:03.715Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated Remote Code Execution in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37427", "datePublished": "2023-08-22T18:03:52.781Z", "dateReserved": "2023-07-05T17:36:47.997Z", "dateUpdated": "2024-10-03T14:51:40.904Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-37422
Vulnerability from cvelistv5
Published
2023-08-22 17:57
Modified
2024-10-03 15:22
Severity ?
EPSS score ?
Summary
Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Version: Orchestrator 9.3.x ≤ <=9.3.0 Version: Orchestrator 9.2.x ≤ <=9.2.5 Version: Orchestrator 9.1.x ≤ <=9.1.7 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T17:16:29.495Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-37422", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-03T15:22:37.757600Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-03T15:22:54.945Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "EdgeConnect SD-WAN Orchestrator", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [ { "lessThanOrEqual": "\u003c=9.3.0", "status": "affected", "version": "Orchestrator 9.3.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.2.5", "status": "affected", "version": "Orchestrator 9.2.x", "versionType": "semver" }, { "lessThanOrEqual": "\u003c=9.1.7", "status": "affected", "version": "Orchestrator 9.1.x", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Daniel Jensen (@dozernz)" } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated\u0026nbsp;remote attacker to conduct a stored cross-site scripting\u0026nbsp;(XSS) attack against an administrative user of the interface.\u0026nbsp;A successful exploit allows an attacker to execute arbitrary\u0026nbsp;script code in a victim\u0027s browser in the context of the\u0026nbsp;affected interface." } ], "value": "Vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated\u00a0remote attacker to conduct a stored cross-site scripting\u00a0(XSS) attack against an administrative user of the interface.\u00a0A successful exploit allows an attacker to execute arbitrary\u00a0script code in a victim\u0027s browser in the context of the\u00a0affected interface." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2023-08-22T17:57:26.526Z", "orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe" }, "references": [ { "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt" } ], "source": { "discovery": "UNKNOWN" }, "title": "Authenticated Stored Cross-Site Scripting Vulnerabilities (XSS) in EdgeConnect SD-WAN Orchestrator Web Administration Interface", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "assignerShortName": "hpe", "cveId": "CVE-2023-37422", "datePublished": "2023-08-22T17:57:26.526Z", "dateReserved": "2023-07-05T17:36:47.995Z", "dateUpdated": "2024-10-03T15:22:54.945Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.