Tuesday, October 15, 2024
HomeCVE/vulnerabilityArubaOS Critical Vulnerability Let Attackers Execute Remote Code

ArubaOS Critical Vulnerability Let Attackers Execute Remote Code

Published on

Malware protection

Multiple vulnerabilities have been discovered in ArubaOS that affect HPE Aruba Networking devices, including Mobility Conductor, Mobility Controllers WLAN Gateways, and SD-WAN Gateways managed by Aruba Central.

These vulnerabilities are linked to Unauthenticated Buffer Overflow (CVE-2024-26305, CVE-2024-26304, CVE-2024-33511, CVE-2024-33512 and CVE-2024-33518) and Unauthenticated Denial-of-Service (CVE-2024-33513, CVE-2024-33514, CVE-2024-33515, CVE-2024-33516, CVE-2024-33517 and CVE-2024-33518). 

The severity of these vulnerabilities ranges from 5.3 (Medium) to 9.8 (Critical). However, all of the vulnerabilities were associated with the PAPI (Protocol Application Programming Interface) protocol.

- Advertisement - SIEM as a Service

Vulnerability Analysis

Unauthenticated Buffer Overflow Vulnerability

This vulnerability existed in multiple places that could allow a threat actor to execute unauthenticated remote code on vulnerable systems.

Document

Integrate ANY.RUN in Your Company for Effective Malware Analysis

Are you from SOC, Threat Research, or DFIR departments? If so, you can join an online community of 400,000 independent security researchers:

  • Real-time Detection
  • Interactive Malware Analysis
  • Easy to Learn by New Security Team members
  • Get detailed reports with maximum data
  • Set Up Virtual Machine in Linux & all Windows OS Versions
  • Interact with Malware Safely

If you want to test all these features now with completely free access to the sandbox:

Successful exploitation of this vulnerability could lead to executing arbitrary code as a privileged user. 

The different places this vulnerability existed and their corresponding severity are as follows:

Unauthenticated Denial-of-Service

This vulnerability allows a threat actor to interrupt the normal operation of the affected product and make it unusable. The existence of this vulnerability in multiple places and their corresponding severities are as follows:

Affected Products And Fixed In Versions

As per the security advisory, the HPE Aruba Networking products affected by this vulnerability are as follows:

  • Mobility Conductor (formerly Mobility Master) 
  • Mobility Controllers 
  • WLAN Gateways and SD-WAN Gateways managed by Aruba Central 
Affected Software VersionsVersions from and up to
ArubaOS 10.5.x.x 10.5.1.0 and below
ArubaOS 10.4.x.x 10.4.1.0 and below
ArubaOS 8.11.x.x 8.11.2.1 and below
ArubaOS 8.10.x.x 8.10.0.10 and below
ArubaOS 8.8.x.x:all
ArubaOS 8.7.x.x:all
ArubaOS 8.6.x.x:all
ArubaOS 6.5.4.x:all
SD-WAN 8.7.0.0-2.3.0.x:all
SD-WAN 8.6.0.4-2.2.x.x:all
Fixed in versionsVersions to
ArubaOS 10.6.x.x10.6.0.0 and above
ArubaOS 10.5.x.x10.5.1.1 and above
ArubaOS 10.4.x.x10.4.1.1 and above
ArubaOS 8.11.x.x8.11.2.2 and above
ArubaOS 8.10.x.x8.10.0.11 and above

It is recommended that users of these products upgrade to the latest versions to prevent their exploitation by threat actors.

Is Your Network Under Attack? - Read CISO’s Guide to Avoiding the Next Breach - Download Free Guide

Raga Varshini
Raga Varshini
Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Latest articles

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The...

Fortigate SSLVPN Vulnerability Exploited in the Wild

A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in...

Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to...

OilRig Hackers Exploiting Microsoft Exchange Server To Steal Login Details

Earth Simnavaz, an Iranian state-sponsored cyber espionage group, has recently intensified its attacks on...

Free Webinar

Protect Websites & APIs from Malware Attack

Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations, defacements, and even blacklisting.

Join us for an insightful webinar featuring Vivek Gopalan, VP of Products at Indusface, as he shares effective strategies for safeguarding websites and APIs against malware.

Discussion points

Scan DOM, internal links, and JavaScript libraries for hidden malware.
Detect website defacements in real time.
Protect your brand by monitoring for potential blacklisting.
Prevent malware from infiltrating your server and cloud infrastructure.

More like this

Hackers Allegedly Selling Data Stolen from Cisco

A group of hackers reportedly sells sensitive data stolen from Cisco Systems, Inc.The...

Fortigate SSLVPN Vulnerability Exploited in the Wild

A critical vulnerability in Fortinet's FortiGate SSLVPN appliances, CVE-2024-23113, has been actively exploited in...

Splunk Enterprise Vulnerabilities let Attackers Execute Remote Code

Splunk has disclosed multiple vulnerabilities affecting its Enterprise product, which could allow attackers to...