Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-41135", "assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0", "state": "PUBLISHED", "assignerShortName": "hpe", "dateReserved": "2024-07-15T21:54:25.878Z", "datePublished": "2024-07-24T20:03:45.603Z", "dateUpdated": "2024-08-02T04:46:52.383Z"}, "containers": {"cna": {"affected": [{"defaultStatus": "unaffected", "product": "HPE Aruba Networking EdgeConnect SD-WAN", "vendor": "Hewlett Packard Enterprise (HPE)", "versions": [{"lessThanOrEqual": "<=9.3.3.0", "status": "affected", "version": "ECOS 9.3.x.x: 9.3.3.0 and below", "versionType": "semver"}, {"lessThanOrEqual": "<=9.2.9.0", "status": "affected", "version": "ECOS 9.2.x.x: 9.2.9.0 and below", "versionType": "semver"}, {"lessThanOrEqual": "<=9.1.11.0", "status": "affected", "version": "ECOS 9.1.x.x: 9.1.11.0 and below", "versionType": "semver"}, {"lessThanOrEqual": "<=9.0.x.x", "status": "affected", "version": "ECOS 9.0.x.x: all builds are affected and are out of maintenance.", "versionType": "semver"}, {"lessThanOrEqual": "<=8.0.x.x", "status": "affected", "version": "ECOS 8.0.x.x: all builds are affected and are out of maintenance.", "versionType": "semver"}]}], "credits": [{"lang": "en", "type": "reporter", "value": "Daniel Jensen (bugcrowd.com/dozernz)"}], "descriptions": [{"lang": "en", "supportingMedia": [{"base64": false, "type": "text/html", "value": "A vulnerability exists in the HPE Aruba Networking EdgeConnect SD-WAN gateway's Command Line Interface that allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability will result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise<br>"}], "value": "A vulnerability exists in the HPE Aruba Networking EdgeConnect SD-WAN gateway's Command Line Interface that allows remote authenticated users to run arbitrary commands on the underlying host. Successful exploitation of this vulnerability will result in the ability to execute arbitrary commands as root on the underlying operating system leading to complete system compromise"}], "metrics": [{"cvssV3_1": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "format": "CVSS", "scenarios": [{"lang": "en", "value": "GENERAL"}]}], "providerMetadata": {"orgId": "eb103674-0d28-4225-80f8-39fb86215de0", "shortName": "hpe", "dateUpdated": "2024-07-24T20:03:45.603Z"}, "references": [{"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04673.txt"}], "source": {"advisory": "HPESBNW04673", "discovery": "EXTERNAL"}, "title": "Authenticated Remote Code Execution in HPE Aruba Networking EdgeConnect SD-WAN Command Line Interface", "x_generator": {"engine": "Vulnogram 0.2.0"}}, "adp": [{"problemTypes": [{"descriptions": [{"type": "CWE", "cweId": "CWE-77", "lang": "en", "description": "CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}], "affected": [{"vendor": "arubanetworks", "product": "edgeconnect_sd-wan_orchestrator", "cpes": ["cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:8.0.0:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "8.0.0", "status": "affected", "lessThan": "8.0.1", "versionType": "semver"}]}, {"vendor": "arubanetworks", "product": "edgeconnect_sd-wan_orchestrator", "cpes": ["cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:9.3.0:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "9.3.0", "status": "affected", "lessThanOrEqual": "9.3.3.0", "versionType": "semver"}]}, {"vendor": "arubanetworks", "product": "edgeconnect_sd-wan_orchestrator", "cpes": ["cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:9.2.0:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "9.2.0", "status": "affected", "lessThanOrEqual": "9.2.9.0", "versionType": "semver"}]}, {"vendor": "arubanetworks", "product": "edgeconnect_sd-wan_orchestrator", "cpes": ["cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:9.1.0:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "9.1.0", "status": "affected", "lessThanOrEqual": "9.1.11.0", "versionType": "semver"}]}, {"vendor": "arubanetworks", "product": "edgeconnect_sd-wan_orchestrator", "cpes": ["cpe:2.3:a:arubanetworks:edgeconnect_sd-wan_orchestrator:9.0.0:*:*:*:*:*:*:*"], "defaultStatus": "unaffected", "versions": [{"version": "9.0.0", "status": "affected", "lessThan": "9.1.0", "versionType": "semver"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-07-24T20:29:52.555289Z", "id": "CVE-2024-41135", "options": [{"Exploitation": "none"}, {"Automatable": "no"}, {"Technical Impact": "total"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-07-25T13:54:59.908Z"}}, {"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-02T04:46:52.383Z"}, "title": "CVE Program Container", "references": [{"url": "https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04673.txt", "tags": ["x_transferred"]}]}]}}