A vulnerability in the web-based management interface of Aruba EdgeConnect Enterprise Orchestrator could allow an remote attacker to persist a session after a password reset or similar session clearing event. Successful exploitation of this vulnerability could allow an authenticated attacker to remain on the system with the permissions of their current session after the session should be invalidated  in Aruba EdgeConnect Enterprise Orchestration Software version(s): Aruba EdgeConnect Enterprise Orchestrator (on-premises), Aruba EdgeConnect Enterprise Orchestrator-as-a-Service, Aruba EdgeConnect Enterprise Orchestrator-SP and Aruba EdgeConnect Enterprise Orchestrator Global Enterprise Tenant Orchestrators - Orchestrator 9.2.1.40179 and below, - Orchestrator 9.1.4.40436 and below, - Orchestrator 9.0.7.40110 and below, - Orchestrator 8.10.23.40015 and below, - Any older branches of Orchestrator not specifically mentioned.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt | Mitigation Vendor Advisory | 
| https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-021.txt | Mitigation Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
            
            
  | 
    
Configuration 2 (hide)
            
            
  | 
    
Configuration 3 (hide)
            
            
  | 
    
Configuration 4 (hide)
            
            
  | 
    
History
                    21 Nov 2024, 07:26
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-01-05 07:15
Updated : 2025-04-10 17:15
NVD link : CVE-2022-43529
Mitre link : CVE-2022-43529
CVE.ORG link : CVE-2022-43529
JSON object : View
Products Affected
                arubanetworks
- aruba_edgeconnect_enterprise_orchestrator
 
CWE
                
                    
                        
                        CWE-384
                        
            Session Fixation
