First published: Tue Aug 22 2023(Updated: )
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Edgeconnect Sd-wan Orchestrator | >=9.0.0<=9.0.5 | |
Arubanetworks Edgeconnect Sd-wan Orchestrator | >=9.1.0<=9.1.7 | |
Arubanetworks Edgeconnect Sd-wan Orchestrator | >=9.2.0<=9.2.5 | |
Arubanetworks Edgeconnect Sd-wan Orchestrator | =9.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-37427 is high with a severity value of 7.2.
CVE-2023-37427 affects Arubanetworks Edgeconnect Sd-wan Orchestrator versions 9.0.0 to 9.0.5, 9.1.0 to 9.1.7, and 9.2.0 to 9.2.5.
Yes, an authenticated remote attacker can exploit CVE-2023-37427.
If CVE-2023-37427 is successfully exploited, an attacker can execute arbitrary commands as root on the underlying host.
To fix CVE-2023-37427, it is recommended to apply the necessary patches provided by Arubanetworks.