Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
sd-wan Vendor: arubanetworks

About This Product

sd-wan is a software product offered by arubanetworks. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 71 known vulnerabilities affecting arubanetworks sd-wan. This includes 10 critical-severity issues and 39 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2020 to 2023, indicating a recent active security attention. 21 medium-severity issues and 1 low-severity issue complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2020-24633 2020-12-11 2024-11-21 9.8 10.0 Likely
CVE-2020-24634 2020-12-11 2024-11-21 9.8 10.0 Likely
CVE-2020-24637 2020-12-11 2024-11-21 7.2 9.0 Likely
CVE-2021-37716 2021-09-07 2024-11-21 9.8 10.0 Likely
CVE-2021-37717 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37718 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37719 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37720 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37721 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37722 2021-09-07 2024-11-21 7.2 9.0 Likely
CVE-2021-37725 2021-09-07 2024-11-21 8.1 8.8 Likely
CVE-2021-37729 2021-09-07 2024-11-21 6.5 5.5 Likely
CVE-2021-37731 2021-09-07 2024-11-21 6.2 7.2 Unknown
CVE-2021-37733 2021-09-07 2024-11-21 4.9 4.0 Likely
CVE-2022-37897 2022-12-12 2025-05-02 9.8 - -
CVE-2022-37898 2022-12-12 2025-05-02 7.2 - -
CVE-2022-37899 2022-12-12 2025-05-02 7.2 - -
CVE-2022-37900 2022-12-12 2025-05-01 7.2 - -
CVE-2022-37901 2022-12-12 2025-05-02 7.2 - -
CVE-2022-37902 2022-12-12 2025-05-02 7.2 - -
CVE-2022-37903 2022-12-12 2025-05-02 7.2 - -
CVE-2022-37904 2022-12-12 2025-05-02 6.6 - -
CVE-2022-37905 2022-12-12 2025-05-02 6.6 - -
CVE-2022-37906 2022-12-12 2025-05-02 6.5 - -
CVE-2022-37907 2022-12-12 2025-05-02 5.8 - -
CVE-2022-37908 2022-12-12 2025-05-02 5.8 - -
CVE-2022-37909 2022-12-12 2025-05-02 5.3 - -
CVE-2022-37910 2022-12-12 2025-05-02 4.4 - -
CVE-2022-37911 2022-12-12 2025-05-02 3.8 - -
CVE-2022-37912 2022-12-12 2025-05-02 7.2 - -
CVE-2023-22747 2023-03-01 2025-03-11 9.8 - -
CVE-2023-22748 2023-03-01 2025-03-07 9.8 - -
CVE-2023-22749 2023-03-01 2025-03-07 9.8 - -
CVE-2023-22750 2023-03-01 2025-03-07 9.8 - -
CVE-2023-22751 2023-03-01 2025-03-07 9.8 - -
CVE-2023-22752 2023-03-01 2025-03-11 9.8 - -
CVE-2023-22753 2023-03-01 2025-03-11 8.1 - -
CVE-2023-22754 2023-03-01 2024-11-21 8.1 - -
CVE-2023-22755 2023-03-01 2024-11-21 8.1 - -
CVE-2023-22756 2023-03-01 2024-11-21 8.1 - -
CVE-2023-22757 2023-03-01 2024-11-21 8.1 - -
CVE-2023-22758 2023-03-01 2024-11-21 7.2 - -
CVE-2023-22759 2023-03-01 2024-11-21 7.2 - -
CVE-2023-22760 2023-03-01 2024-11-21 7.2 - -
CVE-2023-22761 2023-03-01 2024-11-21 7.2 - -
CVE-2023-22762 2023-03-01 2024-11-21 7.2 - -
CVE-2023-22763 2023-03-01 2025-03-11 7.2 - -
CVE-2023-22764 2023-03-01 2025-03-11 7.2 - -
CVE-2023-22765 2023-03-01 2025-03-11 7.2 - -
CVE-2023-22766 2023-03-01 2025-03-11 7.2 - -
CVE-2023-22767 2023-03-01 2025-03-11 7.2 - -
CVE-2023-22768 2023-03-01 2024-11-21 7.2 - -
CVE-2023-22769 2023-03-01 2024-11-21 7.2 - -
CVE-2023-22770 2023-03-01 2024-11-21 7.2 - -
CVE-2023-22771 2023-03-01 2024-11-21 6.8 - -
CVE-2023-22772 2023-03-01 2025-03-07 6.5 - -
CVE-2023-22773 2023-03-01 2025-03-07 7.2 - -
CVE-2023-22774 2023-03-01 2025-03-07 7.2 - -
CVE-2023-22775 2023-03-01 2025-03-07 6.5 - -
CVE-2023-22776 2023-03-01 2025-03-07 4.9 - -
CVE-2023-22777 2023-03-01 2025-03-07 4.9 - -
CVE-2023-22778 2023-03-01 2025-03-07 4.8 - -
CVE-2023-35971 2023-07-05 2024-11-21 8.8 - -
CVE-2023-35972 2023-07-05 2024-11-21 7.2 - -
CVE-2023-35973 2023-07-05 2024-11-21 7.2 - -
CVE-2023-35974 2023-07-05 2024-11-21 7.2 - -
CVE-2023-35975 2023-07-05 2024-11-21 6.5 - -
CVE-2023-35976 2023-07-05 2024-11-21 6.5 - -
CVE-2023-35977 2023-07-05 2024-11-21 6.5 - -
CVE-2023-35978 2023-07-05 2024-11-21 6.1 - -
CVE-2023-35979 2023-07-05 2024-11-21 5.3 - -

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for arubanetworks sd-wan by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.