Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37184: Vulnerability in Hewlett Packard Enterprise (HPE) EdgeConnect SD-WAN Orchestrator

0
Critical
VulnerabilityCVE-2025-37184cvecve-2025-37184
Published: Wed Jan 14 2026 (01/14/2026, 16:19:45 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: EdgeConnect SD-WAN Orchestrator

Description

A vulnerability exists in an Orchestrator service that could allow an unauthenticated remote attacker to bypass multi-factor authentication requirements. Successful exploitation could allow an attacker to create an admin user account without the necessary multi-factor authentication, thereby compromising the integrity of secured access to the system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/03/2026, 18:25:35 UTC

Technical Analysis

CVE-2025-37184 is a critical security vulnerability identified in Hewlett Packard Enterprise's EdgeConnect SD-WAN Orchestrator, specifically affecting versions 9.4.0 and 9.5.0. The flaw resides in an Orchestrator service that improperly enforces multi-factor authentication (MFA) requirements, allowing an unauthenticated remote attacker to bypass MFA protections entirely. This bypass enables the attacker to create a new administrative user account without undergoing the intended MFA verification process, effectively granting full administrative privileges. The vulnerability is categorized under CWE-287 (Improper Authentication), indicating a failure in correctly verifying user identity before granting access. The CVSS v3.1 base score of 9.1 highlights the vulnerability's critical nature, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction needed (UI:N), and a scope unchanged (S:U). The impact primarily compromises integrity (I:H) and availability (A:H) of the system, as unauthorized admin access can lead to malicious configuration changes, service disruption, or further lateral movement within the network. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable. The affected product, HPE EdgeConnect SD-WAN Orchestrator, is a key component in managing SD-WAN deployments, which are critical for enterprise network performance and security. The lack of currently available patches necessitates immediate attention to monitoring and mitigation strategies to reduce exposure.

Potential Impact

The vulnerability poses a severe risk to organizations using HPE EdgeConnect SD-WAN Orchestrator, as it allows attackers to gain unauthorized administrative access without MFA, undermining the system's security controls. This can lead to unauthorized configuration changes, interception or redirection of network traffic, disruption of SD-WAN services, and potential compromise of connected network segments. The integrity of network management is directly threatened, and availability can be impacted if attackers disable or degrade orchestrator functions. Enterprises relying on SD-WAN for secure, reliable connectivity—especially those in sectors like finance, healthcare, government, and critical infrastructure—face heightened risk of operational disruption and data compromise. The ease of exploitation (no authentication or user interaction required) and remote attack vector increase the likelihood of widespread exploitation once public exploits emerge. The absence of patches further exacerbates the threat, potentially allowing attackers to establish persistent footholds and escalate privileges within enterprise networks.

Mitigation Recommendations

Organizations should immediately assess their use of HPE EdgeConnect SD-WAN Orchestrator versions 9.4.0 and 9.5.0 and prioritize risk mitigation. Until official patches are released, implement network-level access controls to restrict access to the Orchestrator management interface to trusted IP addresses and VPNs only. Enable and enforce strict logging and monitoring of all administrative account creations and authentication attempts to detect suspicious activity promptly. Consider deploying Web Application Firewalls (WAF) or Intrusion Prevention Systems (IPS) with custom rules to detect and block attempts to exploit MFA bypass behavior. Review and tighten existing MFA policies and consider additional layers of identity verification where possible. Engage with HPE support channels to obtain updates on patch availability and apply them immediately upon release. Conduct thorough audits of existing administrative accounts to identify and remove any unauthorized users. Finally, incorporate this vulnerability into incident response plans and conduct tabletop exercises to prepare for potential exploitation scenarios.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.381Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6967c568d0ff220b95b357ec

Added to database: 1/14/2026, 4:33:44 PM

Last enriched: 3/3/2026, 6:25:35 PM

Last updated: 3/25/2026, 1:25:20 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses