Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt", "tags": ["Mitigation", "Vendor Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "A vulnerability in the Aruba EdgeConnect Enterprise Orchestrator web-based management interface allows remote authenticated users to run arbitrary commands on the underlying host. A successful exploit could allow an attacker to execute arbitrary commands as root on the underlying operating system leading to complete system compromise in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "NVD-CWE-noinfo"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2022-44534", "ASSIGNER": "security-alert@hpe.com"}}, "impact": {"baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.2, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "HIGH", "confidentialityImpact": "HIGH"}, "impactScore": 5.9, "exploitabilityScore": 1.2}}, "publishedDate": "2023-01-05T07:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:on-premises:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.2.1.40179", "versionStartIncluding": "9.2.0"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:on-premises:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "8.10.23.40015"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:on-premises:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.0.7.40110", "versionStartIncluding": "9.0.0"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:on-premises:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.1.4.40436", "versionStartIncluding": "9.1.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:as-a-service:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "8.10.23.40015"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:as-a-service:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.0.7.40110", "versionStartIncluding": "9.0.0"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:as-a-service:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.1.4.40436", "versionStartIncluding": "9.1.0"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:as-a-service:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.2.1.40179", "versionStartIncluding": "9.2.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:global_enterprise_tenant_orchestrators:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "8.10.23.40015"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:global_enterprise_tenant_orchestrators:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.0.7.40110", "versionStartIncluding": "9.0.0"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:global_enterprise_tenant_orchestrators:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.1.4.40436", "versionStartIncluding": "9.1.0"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:global_enterprise_tenant_orchestrators:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.2.1.40179", "versionStartIncluding": "9.2.0"}]}, {"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:sp:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "8.10.23.40015"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:sp:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.0.7.40110", "versionStartIncluding": "9.0.0"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:sp:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.1.4.40436", "versionStartIncluding": "9.1.0"}, {"cpe23Uri": "cpe:2.3:a:arubanetworks:aruba_edgeconnect_enterprise_orchestrator:*:*:*:*:sp:*:*:*", "cpe_name": [], "vulnerable": true, "versionEndIncluding": "9.2.1.40179", "versionStartIncluding": "9.2.0"}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2023-01-11T17:35Z"}