First published: Wed Nov 30 2022(Updated: )
Vulnerabilities in the Aruba EdgeConnect Enterprise command line interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba EdgeConnect Enterprise Software version(s): ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
arubanetworks EdgeConnect enterprise | >=8.3.1.0<=8.3.7.1 | |
arubanetworks EdgeConnect enterprise | >=9.0.0.0<=9.0.7.0 | |
arubanetworks EdgeConnect enterprise | >=9.1.0.0<=9.1.3.0 | |
arubanetworks EdgeConnect enterprise | >=9.2.0.0<=9.2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-37921 has a high severity rating due to potential root command execution by authenticated users.
To mitigate CVE-2022-37921, update Aruba EdgeConnect Enterprise to the latest patched version recommended by Aruba Networks.
CVE-2022-37921 affects Aruba EdgeConnect Enterprise versions between 8.3.1.0 and 8.3.7.1, 9.0.0.0 and 9.0.7.0, 9.1.0.0 and 9.1.3.0, and 9.2.0.0 and 9.2.1.0.
A successful exploit of CVE-2022-37921 can lead to arbitrary command execution as root, compromising the underlying operating system.
There are no confirmed reports of active exploitation for CVE-2022-37921, but the vulnerability poses a significant risk if unpatched.