Critical RCE Flaws Discovered in HPE Aruba Devices

by | May 3, 2024 | News




Join our Patreon Channel and Gain access to 70+ Exclusive Walkthrough Videos.

Patreon
Reading Time: 3 Minutes

Critical Flaws Discovered in HPE Aruba Networking’s April Security Advisory

HPE Aruba Networking has released its April 2024 security advisory, outlining critical remote code execution (RCE) vulnerabilities affecting various versions of ArubaOS, its proprietary network operating system.

The advisory identifies ten vulnerabilities, with four deemed critical-severity, posing a significant risk of unauthenticated buffer overflow and subsequent remote code execution (RCE).

Impacted products include:

  • HPE Aruba Networking Mobility Conductor
  • Mobility Controllers
  • WLAN Gateways
  • SD-WAN Gateways managed by Aruba Central
  • Alongside several versions of ArubaOS and SD-WAN that have reached end-of-life (EoL).

See Also: So, you want to be a hacker?
Offensive Security, Bug Bounty Courses




Discover your weakest link. Be proactive, not reactive. Cybercriminals need just one flaw to strike.

Among the critical flaws highlighted are:

  • CVE-2024-26305: A vulnerability in ArubaOS’s Utility daemon that permits remote code execution through specially crafted packets.
  • CVE-2024-26304: A flaw in the L2/L3 Management service allowing unauthenticated remote code execution.
  • CVE-2024-33511: Vulnerability in the Automatic Reporting service facilitating remote code execution by exploiting the PAPI protocol port.
  • CVE-2024-33512: A buffer overflow flaw in the Local User Authentication Database service accessed via the PAPI protocol.

To mitigate these vulnerabilities, HPE Aruba Networking advises enabling Enhanced PAPI Security and promptly upgrading to patched versions of ArubaOS. The latest releases also address six additional vulnerabilities rated as “medium” severity.




Administrators are urged to upgrade to the following versions to address all identified flaws:

  • ArubaOS 10.6.0.0 and above
  • ArubaOS 10.5.1.1 and above
  • ArubaOS 10.4.1.1 and above
  • ArubaOS 8.11.2.2 and above
  • ArubaOS 8.10.0.11 and above

While there are no reports of active exploitation or proof-of-concept (PoC) exploits, system administrators are strongly advised to apply the available security updates without delay to mitigate potential risks.

Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]

Source: bleepingcomputer.com

Source Link

Merch

Recent News

EXPLORE OUR STORE

Offensive Security & Ethical Hacking Course

Begin the learning curve of hacking now!


Information Security Solutions

Find out how Pentesting Services can help you.


Join our Community

Share This