5.4
CVE-2022-43529
- EPSS 0.21%
- Published 05.01.2023 07:15:12
- Last modified 10.04.2025 17:15:35
- Source security-alert@hpe.com
- Teams watchlist Login
- Open Login
A vulnerability in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an remote attacker to persist a session after a password reset or similar session clearing event. Successful exploitation of this vulnerability could allow an authenticated attacker to remain on the system with the permissions of their current session after the session should be invalidated in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.
Data is provided by the National Vulnerability Database (NVD)
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionon-premises Version <= 8.10.23.40015
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionon-premises Version >= 9.0.0 <= 9.0.7.40110
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionon-premises Version >= 9.1.0 <= 9.1.4.40436
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionon-premises Version >= 9.2.0 <= 9.2.1.40179
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionas-a-service Version <= 8.10.23.40015
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionas-a-service Version >= 9.0.0 <= 9.0.7.40110
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionas-a-service Version >= 9.1.0 <= 9.1.4.40436
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionas-a-service Version >= 9.2.0 <= 9.2.1.40179
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionglobal_enterprise_tenant_orchestrators Version <= 8.10.23.40015
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionglobal_enterprise_tenant_orchestrators Version >= 9.0.0 <= 9.0.7.40110
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionglobal_enterprise_tenant_orchestrators Version >= 9.1.0 <= 9.1.4.40436
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionglobal_enterprise_tenant_orchestrators Version >= 9.2.0 <= 9.2.1.40179
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionsp Version <= 8.10.23.40015
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionsp Version >= 9.0.0 <= 9.0.7.40110
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionsp Version >= 9.1.0 <= 9.1.4.40436
Arubanetworks ≫ Aruba Edgeconnect Enterprise Orchestrator SwEditionsp Version >= 9.2.0 <= 9.2.1.40179
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.21% | 0.439 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 5.4 | 2.8 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
|
security-alert@hpe.com | 4.6 | 2.1 | 2.5 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
|
CWE-384 Session Fixation
Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.