First published: Wed Jul 24 2024(Updated: )
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a server-side prototype pollution attack. Successful exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Edgeconnect SD-WAN Orchestrator | >=9.1.0<9.1.10 | |
Arubanetworks Edgeconnect SD-WAN Orchestrator | >=9.2.0<9.2.10 | |
Arubanetworks Edgeconnect SD-WAN Orchestrator | >=9.3.0<9.3.3 | |
Arubanetworks Edgeconnect SD-WAN Orchestrator | >=9.4.0<9.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22443 is considered a high severity vulnerability due to its potential for remote exploitation and command execution.
To fix CVE-2024-22443, you should upgrade your EdgeConnect SD-WAN Orchestrator to a version above 9.4.2.
CVE-2024-22443 affects EdgeConnect SD-WAN Orchestrator versions 9.1.0 to 9.1.10, 9.2.0 to 9.2.10, 9.3.0 to 9.3.3, and 9.4.0 to 9.4.2.
No, CVE-2024-22443 requires that the attacker is an authenticated user to exploit the vulnerability.
Exploitation of CVE-2024-22443 could allow an attacker to execute arbitrary commands on the affected system, leading to potential data breaches or system compromise.