First published: Wed Nov 30 2022(Updated: )
A vulnerability within the web-based management interface of EdgeConnect Enterprise could allow a remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface by uploading a specially crafted file. A successful exploit could allow an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface in Aruba EdgeConnect Enterprise Software version(s): ECOS 9.2.1.0 and below; ECOS 9.1.3.0 and below; ECOS 9.0.7.0 and below; ECOS 8.3.7.1 and below.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
arubanetworks EdgeConnect enterprise | >=8.3.1.0<=8.3.7.1 | |
arubanetworks EdgeConnect enterprise | >=9.0.0.0<=9.0.7.0 | |
arubanetworks EdgeConnect enterprise | >=9.1.0.0<=9.1.3.0 | |
arubanetworks EdgeConnect enterprise | >=9.2.0.0<=9.2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2022-37926 is classified as medium due to the potential for stored cross-site scripting attacks.
To mitigate CVE-2022-37926, apply the latest security updates provided by Aruba Networks for EdgeConnect Enterprise.
CVE-2022-37926 can facilitate stored cross-site scripting (XSS) attacks against users of the web management interface.
CVE-2022-37926 affects EdgeConnect Enterprise versions between 8.3.1.0 and 8.3.7.1, as well as versions between 9.0.0.0 and 9.0.7.0, and 9.1.0.0 to 9.1.3.0, and 9.2.0.0 to 9.2.1.0.
Users of the web-based management interface of the affected EdgeConnect Enterprise versions are at risk due to CVE-2022-37926.