Aruba EdgeConnect Enterprise Command Line Interface path traversal
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 5.0 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Aruba EdgeConnect Enterprise. It has been declared as critical. This issue affects some unknown processing of the component Command Line Interface. The manipulation results in path traversal. This vulnerability is known as CVE-2023-30509. No exploit is available. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Details
A vulnerability was found in Aruba EdgeConnect Enterprise (version now known). It has been classified as problematic. Affected is some unknown processing of the component Command Line Interface. The manipulation with an unknown input leads to a path traversal vulnerability. CWE is classifying the issue as CWE-22. The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. This is going to have an impact on confidentiality. CVE summarizes:
Multiple authenticated path traversal vulnerabilities exist in the Aruba EdgeConnect Enterprise command line interface. Successful exploitation of these vulnerabilities result in the ability to read arbitrary files on the underlying operating system, including sensitive system files.
The weakness was published 05/17/2023 as ARUBA-PSA-2023-0007. The advisory is shared for download at arubanetworks.com. This vulnerability is traded as CVE-2023-30509 since 04/11/2023. There are neither technical details nor an exploit publicly available. The current price for an exploit might be approx. USD $0-$5k (estimation calculated on 06/10/2023). The MITRE ATT&CK project declares the attack technique as T1006.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.0VulDB Meta Temp Score: 5.0
VulDB Base Score: 3.5
VulDB Temp Score: 3.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 6.5
NVD Vector: 🔍
CNA Base Score: 4.9
CNA Vector (Hewlett Packard Enterprise (HPE)): 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
Exploiting
Class: Path traversalCWE: CWE-22
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
04/11/2023 🔍05/17/2023 🔍
05/17/2023 🔍
06/10/2023 🔍
Sources
Advisory: ARUBA-PSA-2023-0007Status: Confirmed
CVE: CVE-2023-30509 (🔍)
GCVE (CVE): GCVE-0-2023-30509
GCVE (VulDB): GCVE-100-229200
Entry
Created: 05/17/2023 07:23 AMUpdated: 06/10/2023 07:01 AM
Changes: 05/17/2023 07:23 AM (38), 06/10/2023 07:01 AM (21)
Complete: 🔍
Cache ID: 244:15E:40
No comments yet. Languages: en.
Please log in to comment.