{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-37429","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2023-07-05T17:36:47.997Z","datePublished":"2023-08-22T18:07:58.022Z","dateUpdated":"2024-10-03T14:45:14.356Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"EdgeConnect SD-WAN Orchestrator","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"lessThanOrEqual":"<=9.3.0","status":"affected","version":"Orchestrator 9.3.x","versionType":"semver"},{"lessThanOrEqual":"<=9.2.*","status":"affected","version":"Orchestrator 9.2.x","versionType":"semver"},{"lessThanOrEqual":"<=9.1.*","status":"affected","version":"Orchestrator 9.1.x","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","user":"00000000-0000-4000-9000-000000000000","value":"Daniel Jensen (@dozernz)"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Multiple vulnerabilities in the web-based management&nbsp;interface of EdgeConnect SD-WAN Orchestrator could allow&nbsp;an authenticated remote attacker to conduct SQL injection&nbsp;attacks against the EdgeConnect SD-WAN Orchestrator&nbsp;instance. An attacker could exploit these vulnerabilities to<br>&nbsp; &nbsp; obtain and modify sensitive information in the underlying&nbsp;database potentially leading to the exposure and corruption&nbsp;of sensitive data controlled by the EdgeConnect SD-WAN&nbsp;Orchestrator host.<br><br>"}],"value":"Multiple vulnerabilities in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct SQL injection attacks against the EdgeConnect SD-WAN Orchestrator instance. An attacker could exploit these vulnerabilities to\n    obtain and modify sensitive information in the underlying database potentially leading to the exposure and corruption of sensitive data controlled by the EdgeConnect SD-WAN Orchestrator host.\n\n"}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2023-08-22T18:07:58.022Z"},"references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"}],"source":{"discovery":"UNKNOWN"},"title":"Authenticated SQL Injection Vulnerabilities in EdgeConnect SD-WAN Orchestrator Web-based Management Interface","x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T17:16:29.487Z"},"title":"CVE Program Container","references":[{"url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt","tags":["x_transferred"]}]},{"affected":[{"vendor":"hpe","product":"edgeconnect_sd-wan_orchestrator","cpes":["cpe:2.3:a:hpe:edgeconnect_sd-wan_orchestrator:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"9.1x","status":"affected","lessThanOrEqual":"9.1*","versionType":"semver"},{"version":"9,2x","status":"affected","lessThanOrEqual":"9.2*","versionType":"semver"},{"version":"9.3x","status":"affected","lessThanOrEqual":"9.3.0","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-03T14:42:14.931742Z","id":"CVE-2023-37429","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-10-03T14:45:14.356Z"}}]}}