First published: Wed Jul 24 2024(Updated: )
An authenticated command injection vulnerability exists in the HPE Aruba Networking EdgeConnect SD-WAN gateways Command Line Interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
Arubanetworks Edgeconnect SD-WAN Orchestrator | >=9.1.0<=9.1.11 | |
Arubanetworks Edgeconnect SD-WAN Orchestrator | >=9.2.0<=9.2.9 | |
Arubanetworks Edgeconnect SD-WAN Orchestrator | =8.0.0 | |
Arubanetworks Edgeconnect SD-WAN Orchestrator | =9.0.0 | |
Arubanetworks Edgeconnect SD-WAN Orchestrator | =9.3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2024-41136 is high due to the possibility of executing arbitrary commands as a privileged user.
To fix CVE-2024-41136, update the HPE Aruba Networking EdgeConnect SD-WAN Orchestrator to the latest version that is not affected by this vulnerability.
CVE-2024-41136 affects HPE Aruba Networking EdgeConnect SD-WAN Orchestrator versions from 8.0.0 up to, but not including, 9.3.0.
Authenticated users can exploit CVE-2024-41136 through the Command Line Interface of the HPE Aruba Networking EdgeConnect SD-WAN gateways.
The potential impacts of CVE-2024-41136 include unauthorized command execution that could compromise the underlying operating system.