{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[],"affected_systems_content":"<ul> <li>Orchestrator versions ant\u00e9rieures \u00e0 9.3.1</li> </ul> <p>Les versions 9.2.6 et 9.1.8 corrigent les vuln\u00e9rabilit\u00e9s les plus importantes mentionn\u00e9es dans cet avis.</p> ","content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-37423","url":"https://www.cve.org/CVERecord?id=CVE-2023-37423"},{"name":"CVE-2023-37433","url":"https://www.cve.org/CVERecord?id=CVE-2023-37433"},{"name":"CVE-2023-37435","url":"https://www.cve.org/CVERecord?id=CVE-2023-37435"},{"name":"CVE-2023-37430","url":"https://www.cve.org/CVERecord?id=CVE-2023-37430"},{"name":"CVE-2023-37440","url":"https://www.cve.org/CVERecord?id=CVE-2023-37440"},{"name":"CVE-2023-37434","url":"https://www.cve.org/CVERecord?id=CVE-2023-37434"},{"name":"CVE-2023-37437","url":"https://www.cve.org/CVERecord?id=CVE-2023-37437"},{"name":"CVE-2023-37432","url":"https://www.cve.org/CVERecord?id=CVE-2023-37432"},{"name":"CVE-2023-37431","url":"https://www.cve.org/CVERecord?id=CVE-2023-37431"},{"name":"CVE-2023-37421","url":"https://www.cve.org/CVERecord?id=CVE-2023-37421"},{"name":"CVE-2023-37438","url":"https://www.cve.org/CVERecord?id=CVE-2023-37438"},{"name":"CVE-2023-37424","url":"https://www.cve.org/CVERecord?id=CVE-2023-37424"},{"name":"CVE-2023-37422","url":"https://www.cve.org/CVERecord?id=CVE-2023-37422"},{"name":"CVE-2023-37439","url":"https://www.cve.org/CVERecord?id=CVE-2023-37439"},{"name":"CVE-2023-37426","url":"https://www.cve.org/CVERecord?id=CVE-2023-37426"},{"name":"CVE-2023-37427","url":"https://www.cve.org/CVERecord?id=CVE-2023-37427"},{"name":"CVE-2023-37425","url":"https://www.cve.org/CVERecord?id=CVE-2023-37425"},{"name":"CVE-2023-37436","url":"https://www.cve.org/CVERecord?id=CVE-2023-37436"},{"name":"CVE-2023-37428","url":"https://www.cve.org/CVERecord?id=CVE-2023-37428"},{"name":"CVE-2023-37429","url":"https://www.cve.org/CVERecord?id=CVE-2023-37429"}],"links":[],"reference":"CERTFR-2023-AVI-0674","revisions":[{"description":"Version initiale","revision_date":"2023-08-23T00:00:00.000000"}],"risks":[{"description":"Injection de code indirecte \u00e0 distance (XSS)"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"},{"description":"Contournement de la politique de s\u00e9curit\u00e9"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Aruba EdgeConnect\nSD-WAN Orchestrator. Certaines d'entre elles permettent \u00e0 un attaquant\nde provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un\ncontournement de la politique de s\u00e9curit\u00e9 et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Aruba EdgeConnect SD-WAN Orchestrator","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Aruba ARUBA-PSA-2023-012 du 22 ao\u00fbt 2023","url":"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-012.txt"}]}
