Lucene search

K
cveHpeCVE-2024-41136
HistoryJul 24, 2024 - 9:15 p.m.

CVE-2024-41136

2024-07-2421:15:11
CWE-78
CWE-77
hpe
web.nvd.nist.gov
32
authenticated
command injection
hpe aruba
networking
edgeconnect
sd-wan
gateways
cli
vulnerability
exploitation
arbitrary commands
privileged user.

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

20.1%

An authenticated command injection vulnerability exists in the HPE Aruba Networking EdgeConnect SD-WAN gateways Command Line Interface. Successful exploitation of this vulnerability results in the ability to execute arbitrary commands as a privileged user on the underlying operating system.

Affected configurations

Nvd
Node
arubanetworksedgeconnect_sd-wan_orchestratorRange9.1.09.1.11
OR
arubanetworksedgeconnect_sd-wan_orchestratorRange9.2.09.2.9
OR
arubanetworksedgeconnect_sd-wan_orchestratorMatch8.0.0
OR
arubanetworksedgeconnect_sd-wan_orchestratorMatch9.0.0
OR
arubanetworksedgeconnect_sd-wan_orchestratorMatch9.3.0
VendorProductVersionCPE
arubanetworksedgeconnect_sd-wan_orchestrator*cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*
arubanetworksedgeconnect_sd-wan_orchestrator8.0.0cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:8.0.0:*:*:*:*:*:*:*
arubanetworksedgeconnect_sd-wan_orchestrator9.0.0cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:9.0.0:*:*:*:*:*:*:*
arubanetworksedgeconnect_sd-wan_orchestrator9.3.0cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:9.3.0:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "HPE Aruba Networking EdgeConnect SD-WAN",
    "vendor": "Hewlett Packard Enterprise (HPE)",
    "versions": [
      {
        "lessThanOrEqual": "<=9.3.3.0",
        "status": "affected",
        "version": "ECOS 9.3.x.x: 9.3.3.0 and below",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "<=9.2.9.0",
        "status": "affected",
        "version": "ECOS 9.2.x.x: 9.2.9.0 and below",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "<=9.1.11.0",
        "status": "affected",
        "version": "ECOS 9.1.x.x: 9.1.11.0 and below",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "<=9.0.x.x",
        "status": "affected",
        "version": "ECOS 9.0.x.x: all builds are affected and are out of maintenance.",
        "versionType": "semver"
      },
      {
        "lessThanOrEqual": "<=8.0.x.x",
        "status": "affected",
        "version": "ECOS 8.0.x.x: all builds are affected and are out of maintenance.",
        "versionType": "semver"
      }
    ]
  }
]

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS

0.001

Percentile

20.1%

Related for CVE-2024-41136