First published: Tue Aug 22 2023(Updated: )
A vulnerability in the EdgeConnect SD-WAN Orchestrator web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
Credit: security-alert@hpe.com security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Edgeconnect Sd-wan Orchestrator | >=9.0.0<=9.0.5 | |
Arubanetworks Edgeconnect Sd-wan Orchestrator | >=9.1.0<=9.1.7 | |
Arubanetworks Edgeconnect Sd-wan Orchestrator | >=9.2.0<=9.2.5 | |
Arubanetworks Edgeconnect Sd-wan Orchestrator | =9.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-37428 is a vulnerability in the EdgeConnect SD-WAN Orchestrator web-based management interface that allows remote authenticated users to run arbitrary commands on the underlying host.
A successful exploit of CVE-2023-37428 could allow an attacker to execute arbitrary commands as root on the underlying operating system, leading to compromise of the system.
CVE-2023-37428 has a severity rating of 7.2 (High).
To mitigate the vulnerability, it is recommended to update Arubanetworks Edgeconnect Sd-wan Orchestrator to version 9.3.1 or later.
You can find more information about CVE-2023-37428 in the official Aruba Networks advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt