First published: Wed Nov 30 2022(Updated: )
Vulnerabilities in the Aruba EdgeConnect Enterprise command line interface allow remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba EdgeConnect Enterprise Software version(s): ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Edgeconnect Enterprise | >=8.3.1.0<=8.3.7.1 | |
Arubanetworks Edgeconnect Enterprise | >=9.0.0.0<=9.0.7.0 | |
Arubanetworks Edgeconnect Enterprise | >=9.1.0.0<=9.1.3.0 | |
Arubanetworks Edgeconnect Enterprise | >=9.2.0.0<=9.2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2022-37923.
The severity of CVE-2022-37923 is high with a severity value of 7.2.
The Aruba EdgeConnect Enterprise software versions 8.3.1.0 to 8.3.7.1, 9.0.0.0 to 9.0.7.0, 9.1.0.0 to 9.1.3.0, and 9.2.0.0 to 9.2.1.0 are affected by CVE-2022-37923.
Remote authenticated users can exploit CVE-2022-37923 by running arbitrary commands on the underlying host.
The potential impact of exploiting CVE-2022-37923 is that an attacker could execute arbitrary commands as root on the underlying operating system, leading to complete system compromise.