Search criteria
40 vulnerabilities found for EdgeConnect SD-WAN Orchestrator by Hewlett Packard Enterprise (HPE)
CVE-2023-37440 (GCVE-0-2023-37440)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:10 – Updated: 2024-10-29 19:17
VLAI?
Title
Authenticated Server-Side Request Forgery (SSRF) Leading to Information Disclosure
Summary
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an unauthenticated remote attacker to conduct a server-side request forgery (SSRF) attack. A successful exploit allows an attacker to enumerate information about the internal
structure of the EdgeConnect SD-WAN Orchestrator host leading to potential disclosure of sensitive information.
Severity ?
5.5 (Medium)
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.502Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37440",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-01T15:20:08.877260Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918 Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-29T19:17:30.370Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability in the web-based management interface\u0026nbsp;of EdgeConnect SD-WAN Orchestrator could allow an\u0026nbsp;unauthenticated remote attacker to conduct a server-side\u0026nbsp;request forgery (SSRF) attack. A successful exploit allows\u0026nbsp;an attacker to enumerate information about the internal\u003cbr\u003e\u0026nbsp; \u0026nbsp; structure of the EdgeConnect SD-WAN Orchestrator host leading\u0026nbsp;to potential disclosure of sensitive information.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "A vulnerability in the web-based management interface\u00a0of EdgeConnect SD-WAN Orchestrator could allow an\u00a0unauthenticated remote attacker to conduct a server-side\u00a0request forgery (SSRF) attack. A successful exploit allows\u00a0an attacker to enumerate information about the internal\n\u00a0 \u00a0 structure of the EdgeConnect SD-WAN Orchestrator host leading\u00a0to potential disclosure of sensitive information.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:10:43.522Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Server-Side Request Forgery (SSRF) Leading to Information Disclosure",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37440",
"datePublished": "2023-08-22T18:10:43.522Z",
"dateReserved": "2023-07-05T17:36:47.999Z",
"dateUpdated": "2024-10-29T19:17:30.370Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37439 (GCVE-0-2023-37439)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:09 – Updated: 2024-10-29 19:16
VLAI?
Title
Reflected Cross Site Scripting in EdgeConnect SD-WAN Orchestrator Web Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.1 (Medium)
CWE
- CWE-922 - Insecure Storage of Sensitive Information
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.5 (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.7 (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.530Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37439",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-02T15:02:24.461658Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-922",
"description": "CWE-922 Insecure Storage of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-29T19:16:16.550Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.5",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.7",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:09:38.208Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Reflected Cross Site Scripting in EdgeConnect SD-WAN Orchestrator Web Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37439",
"datePublished": "2023-08-22T18:09:38.208Z",
"dateReserved": "2023-07-05T17:36:47.999Z",
"dateUpdated": "2024-10-29T19:16:16.550Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37438 (GCVE-0-2023-37438)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-03 14:16
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.966Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37438",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:11:24.698521Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:16:57.194Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:32.465Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37438",
"datePublished": "2023-08-22T18:08:32.465Z",
"dateReserved": "2023-07-05T17:36:47.999Z",
"dateUpdated": "2024-10-03T14:16:57.194Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37437 (GCVE-0-2023-37437)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-03 14:21
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:30.088Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37437",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:18:49.562770Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:21:24.724Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:28.560Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37437",
"datePublished": "2023-08-22T18:08:28.560Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-03T14:21:24.724Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37436 (GCVE-0-2023-37436)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-04 15:48
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.417Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37436",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:44:55.230674Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T15:48:23.055Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:25.585Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37436",
"datePublished": "2023-08-22T18:08:25.585Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T15:48:23.055Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37435 (GCVE-0-2023-37435)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-04 15:51
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.529Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37435",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:48:50.990192Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T15:51:02.673Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:21.918Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37435",
"datePublished": "2023-08-22T18:08:21.918Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T15:51:02.673Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37434 (GCVE-0-2023-37434)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-04 15:56
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.518Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37434",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:53:08.313338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T15:56:14.997Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:17.910Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37434",
"datePublished": "2023-08-22T18:08:17.910Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T15:56:14.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37433 (GCVE-0-2023-37433)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-04 15:59
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.494Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37433",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:56:52.612495Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T15:59:29.442Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:11.685Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37433",
"datePublished": "2023-08-22T18:08:11.685Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T15:59:29.442Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37432 (GCVE-0-2023-37432)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-04 16:03
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.501Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37432",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T16:00:09.877411Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T16:03:15.265Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:07.446Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37432",
"datePublished": "2023-08-22T18:08:07.446Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T16:03:15.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37431 (GCVE-0-2023-37431)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-03 14:25
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.558Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2X",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37431",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:23:36.628813Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:25:32.604Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:14.679Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37431",
"datePublished": "2023-08-22T18:08:04.472Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-03T14:25:32.604Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37430 (GCVE-0-2023-37430)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:08 – Updated: 2024-10-03 14:41
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.471Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37430",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:36:46.334538Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:41:00.162Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:01.717Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37430",
"datePublished": "2023-08-22T18:08:01.717Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T14:41:00.162Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37429 (GCVE-0-2023-37429)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:07 – Updated: 2024-10-03 14:45
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.487Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9,2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37429",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:42:14.931742Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:45:14.356Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:07:58.022Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37429",
"datePublished": "2023-08-22T18:07:58.022Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T14:45:14.356Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37428 (GCVE-0-2023-37428)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:04 – Updated: 2024-10-03 14:48
VLAI?
Title
Authenticated Remote Code Execution via Path Traversal in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface
Summary
A vulnerability in the EdgeConnect SD-WAN Orchestrator web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
Severity ?
7.2 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.5 (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.7 (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.573Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1.7",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2.5",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37428",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:45:59.634603Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:48:07.190Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.5",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.7",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability in the EdgeConnect SD-WAN Orchestrator\u0026nbsp;web-based management interface allows remote authenticated\u0026nbsp;users to run arbitrary commands on the underlying host.\u0026nbsp;A successful exploit could allow an attacker to execute\u0026nbsp;arbitrary commands as root on the underlying operating system\u0026nbsp;leading to complete system compromise."
}
],
"value": "A vulnerability in the EdgeConnect SD-WAN Orchestrator\u00a0web-based management interface allows remote authenticated\u00a0users to run arbitrary commands on the underlying host.\u00a0A successful exploit could allow an attacker to execute\u00a0arbitrary commands as root on the underlying operating system\u00a0leading to complete system compromise."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:04:50.122Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Remote Code Execution via Path Traversal in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37428",
"datePublished": "2023-08-22T18:04:50.122Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T14:48:07.190Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37427 (GCVE-0-2023-37427)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:03 – Updated: 2024-10-03 14:51
VLAI?
Title
Authenticated Remote Code Execution in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface
Summary
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
Severity ?
7.2 (High)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.5 (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.7 (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.565Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1.7",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2.5",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37427",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:49:06.698612Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:51:40.904Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.5",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.7",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability in the web-based management interface of\u0026nbsp;EdgeConnect SD-WAN Orchestrator could allow an authenticated\u0026nbsp;remote attacker to run arbitrary commands on the underlying\u0026nbsp;host. Successful exploitation of this vulnerability allows\u0026nbsp;an attacker to execute arbitrary commands as root on the\u0026nbsp;underlying operating system leading to complete system\u0026nbsp;compromise."
}
],
"value": "A vulnerability in the web-based management interface of\u00a0EdgeConnect SD-WAN Orchestrator could allow an authenticated\u00a0remote attacker to run arbitrary commands on the underlying\u00a0host. Successful exploitation of this vulnerability allows\u00a0an attacker to execute arbitrary commands as root on the\u00a0underlying operating system leading to complete system\u00a0compromise."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:05:03.715Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Remote Code Execution in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37427",
"datePublished": "2023-08-22T18:03:52.781Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T14:51:40.904Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37426 (GCVE-0-2023-37426)
Vulnerability from cvelistv5 – Published: 2023-08-22 18:02 – Updated: 2024-10-03 15:04
VLAI?
Title
Shared SSH Static Host Keys in EdgeConnect SD-WAN Orchestrator
Summary
EdgeConnect SD-WAN Orchestrator instances prior to the versions resolved in this advisory were found to have shared static SSH host keys for all installations. This vulnerability could allow an attacker to spoof the SSH host signature and thereby masquerade as a legitimate Orchestrator
host.
Severity ?
7.4 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.5 (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.7 (semver) |
Credits
Dean Freeman
Carmody Rauch
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.531Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1.7",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.2.5",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37426",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:55:28.579141Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T15:04:38.699Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.5",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.7",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Dean Freeman"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Carmody Rauch"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "EdgeConnect SD-WAN Orchestrator instances prior to the\u0026nbsp;versions resolved in this advisory were found to have\u0026nbsp;shared static SSH host keys for all installations. This\u0026nbsp;vulnerability could allow an attacker to spoof the SSH host\u0026nbsp;signature and thereby masquerade as a legitimate Orchestrator\u003cbr\u003ehost."
}
],
"value": "EdgeConnect SD-WAN Orchestrator instances prior to the\u00a0versions resolved in this advisory were found to have\u00a0shared static SSH host keys for all installations. This\u00a0vulnerability could allow an attacker to spoof the SSH host\u00a0signature and thereby masquerade as a legitimate Orchestrator\nhost."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:02:22.824Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Shared SSH Static Host Keys in EdgeConnect SD-WAN Orchestrator",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37426",
"datePublished": "2023-08-22T18:02:22.824Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T15:04:38.699Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37440 (GCVE-0-2023-37440)
Vulnerability from nvd – Published: 2023-08-22 18:10 – Updated: 2024-10-29 19:17
VLAI?
Title
Authenticated Server-Side Request Forgery (SSRF) Leading to Information Disclosure
Summary
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an unauthenticated remote attacker to conduct a server-side request forgery (SSRF) attack. A successful exploit allows an attacker to enumerate information about the internal
structure of the EdgeConnect SD-WAN Orchestrator host leading to potential disclosure of sensitive information.
Severity ?
5.5 (Medium)
CWE
- CWE-918 - Server-Side Request Forgery (SSRF)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.502Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37440",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-01T15:20:08.877260Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-918",
"description": "CWE-918 Server-Side Request Forgery (SSRF)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-29T19:17:30.370Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability in the web-based management interface\u0026nbsp;of EdgeConnect SD-WAN Orchestrator could allow an\u0026nbsp;unauthenticated remote attacker to conduct a server-side\u0026nbsp;request forgery (SSRF) attack. A successful exploit allows\u0026nbsp;an attacker to enumerate information about the internal\u003cbr\u003e\u0026nbsp; \u0026nbsp; structure of the EdgeConnect SD-WAN Orchestrator host leading\u0026nbsp;to potential disclosure of sensitive information.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "A vulnerability in the web-based management interface\u00a0of EdgeConnect SD-WAN Orchestrator could allow an\u00a0unauthenticated remote attacker to conduct a server-side\u00a0request forgery (SSRF) attack. A successful exploit allows\u00a0an attacker to enumerate information about the internal\n\u00a0 \u00a0 structure of the EdgeConnect SD-WAN Orchestrator host leading\u00a0to potential disclosure of sensitive information.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:10:43.522Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Server-Side Request Forgery (SSRF) Leading to Information Disclosure",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37440",
"datePublished": "2023-08-22T18:10:43.522Z",
"dateReserved": "2023-07-05T17:36:47.999Z",
"dateUpdated": "2024-10-29T19:17:30.370Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37439 (GCVE-0-2023-37439)
Vulnerability from nvd – Published: 2023-08-22 18:09 – Updated: 2024-10-29 19:16
VLAI?
Title
Reflected Cross Site Scripting in EdgeConnect SD-WAN Orchestrator Web Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.1 (Medium)
CWE
- CWE-922 - Insecure Storage of Sensitive Information
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.5 (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.7 (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.530Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37439",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-02T15:02:24.461658Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-922",
"description": "CWE-922 Insecure Storage of Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-29T19:16:16.550Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.5",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.7",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:09:38.208Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Reflected Cross Site Scripting in EdgeConnect SD-WAN Orchestrator Web Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37439",
"datePublished": "2023-08-22T18:09:38.208Z",
"dateReserved": "2023-07-05T17:36:47.999Z",
"dateUpdated": "2024-10-29T19:16:16.550Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37438 (GCVE-0-2023-37438)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-03 14:16
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.966Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37438",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:11:24.698521Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:16:57.194Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:32.465Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37438",
"datePublished": "2023-08-22T18:08:32.465Z",
"dateReserved": "2023-07-05T17:36:47.999Z",
"dateUpdated": "2024-10-03T14:16:57.194Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37437 (GCVE-0-2023-37437)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-03 14:21
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:30.088Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37437",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:18:49.562770Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:21:24.724Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:28.560Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37437",
"datePublished": "2023-08-22T18:08:28.560Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-03T14:21:24.724Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37436 (GCVE-0-2023-37436)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-04 15:48
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.417Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37436",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:44:55.230674Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T15:48:23.055Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:25.585Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37436",
"datePublished": "2023-08-22T18:08:25.585Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T15:48:23.055Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37435 (GCVE-0-2023-37435)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-04 15:51
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.529Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37435",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:48:50.990192Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T15:51:02.673Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:21.918Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37435",
"datePublished": "2023-08-22T18:08:21.918Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T15:51:02.673Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37434 (GCVE-0-2023-37434)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-04 15:56
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.518Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37434",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:53:08.313338Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T15:56:14.997Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:17.910Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37434",
"datePublished": "2023-08-22T18:08:17.910Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T15:56:14.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37433 (GCVE-0-2023-37433)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-04 15:59
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.494Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37433",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T15:56:52.612495Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T15:59:29.442Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:11.685Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37433",
"datePublished": "2023-08-22T18:08:11.685Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T15:59:29.442Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37432 (GCVE-0-2023-37432)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-04 16:03
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.501Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37432",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-04T16:00:09.877411Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-04T16:03:15.265Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:07.446Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37432",
"datePublished": "2023-08-22T18:08:07.446Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-04T16:03:15.265Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37431 (GCVE-0-2023-37431)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-03 14:25
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.558Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2X",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37431",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:23:36.628813Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:25:32.604Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:14.679Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37431",
"datePublished": "2023-08-22T18:08:04.472Z",
"dateReserved": "2023-07-05T17:36:47.998Z",
"dateUpdated": "2024-10-03T14:25:32.604Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37430 (GCVE-0-2023-37430)
Vulnerability from nvd – Published: 2023-08-22 18:08 – Updated: 2024-10-03 14:41
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.471Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37430",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:36:46.334538Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:41:00.162Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:08:01.717Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37430",
"datePublished": "2023-08-22T18:08:01.717Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T14:41:00.162Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37429 (GCVE-0-2023-37429)
Vulnerability from nvd – Published: 2023-08-22 18:07 – Updated: 2024-10-03 14:45
VLAI?
Title
Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface
Summary
Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to
obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.
Severity ?
6.5 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.* (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.* (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.487Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1*",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2*",
"status": "affected",
"version": "9,2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37429",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:42:14.931742Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:45:14.356Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.*",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.*",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple vulnerabilities in the web-based management\u0026nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow\u0026nbsp;an authenticated remote attacker to conduct SQL injection\u0026nbsp;attacks against the EdgeConnect SD-WAN Orchestrator\u0026nbsp;instance. An attacker could exploit these vulnerabilities to\u003cbr\u003e\u0026nbsp; \u0026nbsp; obtain and modify sensitive information in the underlying\u0026nbsp;database potentially leading to the exposure and corruption\u0026nbsp;of sensitive data controlled by the EdgeConnect SD-WAN\u0026nbsp;Orchestrator host.\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Multiple vulnerabilities in the web-based management\u00a0interface of EdgeConnect SD-WAN Orchestrator could allow\u00a0an authenticated remote attacker to conduct SQL injection\u00a0attacks against the EdgeConnect SD-WAN Orchestrator\u00a0instance. An attacker could exploit these vulnerabilities to\n\u00a0 \u00a0 obtain and modify sensitive information in the underlying\u00a0database potentially leading to the exposure and corruption\u00a0of sensitive data controlled by the EdgeConnect SD-WAN\u00a0Orchestrator host.\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:07:58.022Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37429",
"datePublished": "2023-08-22T18:07:58.022Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T14:45:14.356Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37428 (GCVE-0-2023-37428)
Vulnerability from nvd – Published: 2023-08-22 18:04 – Updated: 2024-10-03 14:48
VLAI?
Title
Authenticated Remote Code Execution via Path Traversal in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface
Summary
A vulnerability in the EdgeConnect SD-WAN Orchestrator web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
Severity ?
7.2 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.5 (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.7 (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.573Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1.7",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2.5",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37428",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:45:59.634603Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:48:07.190Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.5",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.7",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability in the EdgeConnect SD-WAN Orchestrator\u0026nbsp;web-based management interface allows remote authenticated\u0026nbsp;users to run arbitrary commands on the underlying host.\u0026nbsp;A successful exploit could allow an attacker to execute\u0026nbsp;arbitrary commands as root on the underlying operating system\u0026nbsp;leading to complete system compromise."
}
],
"value": "A vulnerability in the EdgeConnect SD-WAN Orchestrator\u00a0web-based management interface allows remote authenticated\u00a0users to run arbitrary commands on the underlying host.\u00a0A successful exploit could allow an attacker to execute\u00a0arbitrary commands as root on the underlying operating system\u00a0leading to complete system compromise."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:04:50.122Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Remote Code Execution via Path Traversal in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37428",
"datePublished": "2023-08-22T18:04:50.122Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T14:48:07.190Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37427 (GCVE-0-2023-37427)
Vulnerability from nvd – Published: 2023-08-22 18:03 – Updated: 2024-10-03 14:51
VLAI?
Title
Authenticated Remote Code Execution in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface
Summary
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise.
Severity ?
7.2 (High)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.5 (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.7 (semver) |
Credits
Daniel Jensen (@dozernz)
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.565Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1.7",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.2.5",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
},
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37427",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:49:06.698612Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T14:51:40.904Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.5",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.7",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Daniel Jensen (@dozernz)"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A vulnerability in the web-based management interface of\u0026nbsp;EdgeConnect SD-WAN Orchestrator could allow an authenticated\u0026nbsp;remote attacker to run arbitrary commands on the underlying\u0026nbsp;host. Successful exploitation of this vulnerability allows\u0026nbsp;an attacker to execute arbitrary commands as root on the\u0026nbsp;underlying operating system leading to complete system\u0026nbsp;compromise."
}
],
"value": "A vulnerability in the web-based management interface of\u00a0EdgeConnect SD-WAN Orchestrator could allow an authenticated\u00a0remote attacker to run arbitrary commands on the underlying\u00a0host. Successful exploitation of this vulnerability allows\u00a0an attacker to execute arbitrary commands as root on the\u00a0underlying operating system leading to complete system\u00a0compromise."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:05:03.715Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Authenticated Remote Code Execution in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37427",
"datePublished": "2023-08-22T18:03:52.781Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T14:51:40.904Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2023-37426 (GCVE-0-2023-37426)
Vulnerability from nvd – Published: 2023-08-22 18:02 – Updated: 2024-10-03 15:04
VLAI?
Title
Shared SSH Static Host Keys in EdgeConnect SD-WAN Orchestrator
Summary
EdgeConnect SD-WAN Orchestrator instances prior to the versions resolved in this advisory were found to have shared static SSH host keys for all installations. This vulnerability could allow an attacker to spoof the SSH host signature and thereby masquerade as a legitimate Orchestrator
host.
Severity ?
7.4 (High)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | EdgeConnect SD-WAN Orchestrator |
Affected:
Orchestrator 9.3.x , ≤ <=9.3.0
(semver)
Affected: Orchestrator 9.2.x , ≤ <=9.2.5 (semver) Affected: Orchestrator 9.1.x , ≤ <=9.1.7 (semver) |
Credits
Dean Freeman
Carmody Rauch
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T17:16:29.531Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.1.7",
"status": "affected",
"version": "9.1x",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.2.5",
"status": "affected",
"version": "9.2x",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "edgeconnect_sd-wan_orchestrator",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "9.3.0",
"status": "affected",
"version": "9.3x",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-37426",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-03T14:55:28.579141Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-03T15:04:38.699Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "EdgeConnect SD-WAN Orchestrator",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=9.3.0",
"status": "affected",
"version": "Orchestrator 9.3.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.2.5",
"status": "affected",
"version": "Orchestrator 9.2.x",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=9.1.7",
"status": "affected",
"version": "Orchestrator 9.1.x",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Dean Freeman"
},
{
"lang": "en",
"type": "finder",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Carmody Rauch"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "EdgeConnect SD-WAN Orchestrator instances prior to the\u0026nbsp;versions resolved in this advisory were found to have\u0026nbsp;shared static SSH host keys for all installations. This\u0026nbsp;vulnerability could allow an attacker to spoof the SSH host\u0026nbsp;signature and thereby masquerade as a legitimate Orchestrator\u003cbr\u003ehost."
}
],
"value": "EdgeConnect SD-WAN Orchestrator instances prior to the\u00a0versions resolved in this advisory were found to have\u00a0shared static SSH host keys for all installations. This\u00a0vulnerability could allow an attacker to spoof the SSH host\u00a0signature and thereby masquerade as a legitimate Orchestrator\nhost."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-08-22T18:02:22.824Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Shared SSH Static Host Keys in EdgeConnect SD-WAN Orchestrator",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2023-37426",
"datePublished": "2023-08-22T18:02:22.824Z",
"dateReserved": "2023-07-05T17:36:47.997Z",
"dateUpdated": "2024-10-03T15:04:38.699Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}