EdgeConnect SDWAN Orchestrator Authenticated Admin XSS to Execute Scripts
CVE-2024-41914 Published on July 24, 2024
A vulnerability in the web-based management interface of EdgeConnect SD-WAN Orchestrator could allow an authenticated remote attacker to conduct a stored cross-site scripting (XSS) attack against an administrative user of the interface. A successful exploit allows an attacker to execute arbitrary script code in a victim's browser in the context of the affected interface.
Vulnerability Analysis
CVE-2024-41914 is exploitable with network access, requires user interaction and user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and no impact on availability.
Weakness Type
What is a XSS Vulnerability?
The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
CVE-2024-41914 has been classified to as a XSS vulnerability or weakness.
Products Associated with CVE-2024-41914
Want to know whenever a new CVE is published for Aruba Networks Edgeconnect Sd Wan Orchestrator? stack.watch will email you.
Affected Versions
Hewlett Packard Enterprise HPE Aruba Networking EdgeConnect SD-WAN Orchestrator:- Version EdgeConnect SD-WAN Orchestrator 9.4.x: Orchestrator 9.4.1 (all builds) and below, <= <=9.4.1 is affected.
- Version EdgeConnect SD-WAN Orchestrator 9.3.x: Orchestrator 9.3.2 (all builds) and below, <= <=9.3.2 is affected.
- Version EdgeConnect SD-WAN Orchestrator 9.2.x: Orchestrator 9.2.9 (all builds) and below, <= <=9.2.9 is affected.
- Version EdgeConnect SD-WAN Orchestrator 9.1.x: Orchestrator 9.1.9 (all builds) and below, <= <=9.1.9 is affected.
- Version 9.1.0, <= 9.1.9 is affected.
- Version 9.2.0, <= 9.2.9 is affected.
- Version 9.3.0, <= 9.3.2 is affected.
- Version 9.4.0, <= 9.4.1 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.