{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-37427","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2023-07-05T17:36:47.997Z","datePublished":"2023-08-22T18:03:52.781Z","dateUpdated":"2024-10-03T14:51:40.904Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"EdgeConnect SD-WAN Orchestrator","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"lessThanOrEqual":"<=9.3.0","status":"affected","version":"Orchestrator 9.3.x","versionType":"semver"},{"lessThanOrEqual":"<=9.2.5","status":"affected","version":"Orchestrator 9.2.x","versionType":"semver"},{"lessThanOrEqual":"<=9.1.7","status":"affected","version":"Orchestrator 9.1.x","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Daniel Jensen (@dozernz)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"A vulnerability in the web-based management interface of&nbsp;EdgeConnect SD-WAN Orchestrator could allow an authenticated&nbsp;remote attacker to run arbitrary commands on the underlying&nbsp;host. Successful exploitation of this vulnerability allows&nbsp;an attacker to execute arbitrary commands as root on the&nbsp;underlying operating system leading to complete system&nbsp;compromise."}],"value":"A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability allows an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2023-08-22T18:05:03.715Z"},"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"}],"source":{"discovery":"UNKNOWN"},"title":"Authenticated Remote Code Execution in EdgeConnect SD-WAN Orchestrator Web-Based Management Interface","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:16:29.565Z"},"title":"CVE Program Container","references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt","tags":["x_transferred"]}]},{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-94","lang":"en","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"affected":[{"vendor":"hpe","product":"edgeconnect_sd-wan_orchestrator","cpes":["cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"9.1x","status":"affected","lessThanOrEqual":"9.1.7","versionType":"semver"},{"version":"9.2x","status":"affected","lessThanOrEqual":"9.2.5","versionType":"semver"},{"version":"9.3x","status":"affected","lessThanOrEqual":"9.3.0","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-03T14:49:06.698612Z","id":"CVE-2023-37427","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-03T14:51:40.904Z"}}]}}