Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37184: Vulnerability in Hewlett Packard Enterprise (HPE) EdgeConnect SD-WAN Orchestrator

0
Medium
VulnerabilityCVE-2025-37184cvecve-2025-37184
Published: Wed Jan 14 2026 (01/14/2026, 16:19:45 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: EdgeConnect SD-WAN Orchestrator

Description

CVE-2025-37184 is a medium-severity vulnerability in Hewlett Packard Enterprise's EdgeConnect SD-WAN Orchestrator versions 9. 4. 0 and 9. 5. 0. It allows an unauthenticated remote attacker with limited privileges to bypass multi-factor authentication (MFA) controls. Exploiting this flaw enables the attacker to create an administrative user account without undergoing MFA, thereby compromising the integrity of the system's access controls. The vulnerability does not impact confidentiality or availability directly but poses a significant risk to system integrity. No known exploits are currently in the wild. European organizations using affected HPE EdgeConnect SD-WAN Orchestrator versions should prioritize patching or mitigating this vulnerability to prevent unauthorized administrative access.

AI-Powered Analysis

AILast updated: 01/14/2026, 16:49:22 UTC

Technical Analysis

CVE-2025-37184 is a vulnerability identified in Hewlett Packard Enterprise's EdgeConnect SD-WAN Orchestrator, specifically affecting versions 9.4.0 and 9.5.0. The flaw resides in an Orchestrator service that improperly enforces multi-factor authentication (MFA) requirements. An unauthenticated remote attacker with limited privileges can exploit this vulnerability to bypass MFA controls, allowing the creation of a new administrative user account without completing the required MFA process. This bypass undermines the integrity of the system's access control mechanisms, potentially granting the attacker full administrative privileges on the orchestrator. The vulnerability has a CVSS 3.1 base score of 6.5, reflecting a medium severity level, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring low privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). Although no known exploits are currently reported in the wild, the potential for privilege escalation and administrative account creation makes this a significant risk. The orchestrator is a critical component in managing SD-WAN deployments, and unauthorized administrative access could lead to manipulation of network traffic, configuration changes, or disruption of network services. The vulnerability was reserved in April 2025 and published in January 2026, indicating a recent discovery. No official patches or mitigations are listed yet, emphasizing the need for immediate attention from affected organizations.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the integrity of SD-WAN network management. Successful exploitation could allow attackers to gain unauthorized administrative access, potentially leading to unauthorized configuration changes, interception or rerouting of sensitive network traffic, or disruption of network operations. Given the critical role of SD-WAN orchestrators in managing enterprise-wide network connectivity, such compromise could affect business continuity, data integrity, and compliance with regulatory requirements such as GDPR. Organizations in sectors with stringent security needs—such as finance, healthcare, energy, and government—are particularly vulnerable. The lack of confidentiality and availability impact reduces the risk of data leakage or denial of service directly from this vulnerability, but the integrity compromise could facilitate further attacks or persistent access. The medium CVSS score reflects the need for timely remediation but indicates that exploitation requires some level of privilege, limiting the attack surface to some extent. However, the absence of user interaction and network-based attack vector increase the likelihood of remote exploitation once an attacker gains low-level access.

Mitigation Recommendations

1. Monitor HPE's official channels closely for patches or security advisories addressing CVE-2025-37184 and apply updates promptly once available. 2. Restrict network access to the EdgeConnect SD-WAN Orchestrator management interfaces using network segmentation, firewall rules, and VPNs to limit exposure to trusted administrators only. 3. Implement strict access control policies and audit logging to detect unauthorized account creations or privilege escalations. 4. Employ anomaly detection tools to monitor for unusual administrative activities or configuration changes within the orchestrator environment. 5. Enforce strong authentication policies beyond MFA, such as certificate-based authentication or hardware tokens, if supported by the platform. 6. Conduct regular security assessments and penetration testing focused on SD-WAN infrastructure to identify potential exploitation paths. 7. Educate network and security teams about this vulnerability and ensure incident response plans include scenarios involving orchestrator compromise. 8. Consider temporary compensating controls such as disabling remote administrative access or limiting it to jump hosts until patches are applied.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.381Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6967c568d0ff220b95b357ec

Added to database: 1/14/2026, 4:33:44 PM

Last enriched: 1/14/2026, 4:49:22 PM

Last updated: 1/14/2026, 5:53:09 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats