We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-41134

Authenticated Remote Code Execution in HPE Aruba Networking EdgeConnect SD-WAN Command Line Interface



Assignerhpe
Reserved2024-07-15
Published2024-07-24
Updated2024-08-02

Description

A vulnerability exists in the HPE Aruba Networking EdgeConnect SD-WAN gateway's Command Line Interface that allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability will result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise



HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
unaffected

ECOS 9.3.x.x: 9.3.3.0 and below
affected

ECOS 9.2.x.x: 9.2.9.0 and below
affected

ECOS 9.1.x.x: 9.1.11.0 and below
affected

ECOS 9.0.x.x: all builds are affected and are out of maintenance.
affected

ECOS 8.0.x.x: all builds are affected and are out of maintenance.
affected

Credits

Daniel Jensen (bugcrowd.com/dozernz) 0x4006b49e50

References

https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04673.txt

cve.org CVE-2024-41134

nvd.nist.gov CVE-2024-41134

Download JSON

Share this page
https://cve.threatint.com
Subscribe to our newsletter to learn more about our work.