Security

Patches

Patch up – 4 critical bugs in ArubaOS lead to remote code execution

Ten vulnerabilities in total for admins to apply


Network admins are being urged to patch a bundle of critical vulnerabilities in ArubaOS that lead to remote code execution as a privileged user.

HPE Aruba Networking disclosed ten vulnerabilities this week, four of which are rated "critical" with 9.8 severity ratings.

All four of the critical issues are classified as buffer overflow vulnerabilities, each affecting different underlying components of ArubaOS – the operating system that runs Aruba's wireless solutions.

The four critical vulnerabilities are: 

Proof of concept exploit code hasn't yet been released, but the security advisories say all four components are accessed via Aruba's process application programming interface (PAPI) UDP port (8211), and sending specially crafted packets can lead to arbitrary code execution.

Aruba Mobility Conductors, Mobility Controllers, and WLAN gateways and SD-WAN gateways managed by Aruba Central are affected by the vulnerabilities.

The list of versions that need upgrading are:

There is also a list of software versions that no longer receive technical support but are vulnerable to the security issues:

The four critical vulnerabilities only affect ArubaOS 8.x and a temporary workaround is available while admins make the time to apply all the patches. According to the advisory, enabling the PAPI Security feature using a non-default key will prevent any exploits. 

As for the other six vulnerabilities, these are all graded as medium severity and were reported via the vendor's bug bounty program.

CVE-2024-33513, CVE-2024-33514, and CVE-2024-33515 are all unauthenticated denial of service (DoS) flaws in ArubaOS' AP management service and each have a 5.9 severity score.

CVE-2024-33516 is another unauthenticated DoS bug, but this one instead impacts the auth service, carrying a 5.3 severity score. The researcher credited with the finding, along with the three other DoS bugs, was named as Chancen.

Chancen also reported a fifth unauthenticated DoS vulnerability in CVE-2024-33517. This again carries a 5.3 severity rating and affects the radio frequency manager service.

A researcher named XiaoC from Moonlight Bug Hunter was credited with the final medium severity (5.3) bug – an unauthenticated buffer overflow that leads to DoS in the radio frequency daemon.

Like the four critical bugs, the six medium-severity vulnerabilities can also be mitigated by enabling the PAPI Security feature, but it's always best to apply the patches as soon as possible. ®

Send us news
4 Comments

Tired of airport security queues? SQL inject yourself into the cockpit, claim researchers

Infosec hounds say they spotted vulnerability during routine travel in the US

Check your IP cameras: There's a new Mirai botnet on the rise

Also, US offering $2.5M for Belarusian hacker, Backpage kingpins jailed, additional MOVEit victims, and more

US sues Georgia Tech over alleged cybersecurity failings as a Pentagon contractor

Rap sheet spells out major no-nos after disgruntled staff blow whistle

What a glimpse inside the Black Hat NOC reveals about infosec pros' security habits

Basic Auth among web traffic? Possible flaw in a well-known commercial VPN product? 'Security has to watch its own things'

RansomHub hits 210 victims in just 6 months

The ransomware gang recruits high-profile affiliates from LockBit and ALPHV

Brain Cipher claims attack on Olympic venue, promises 300 GB data leak

French police reckon financial system targeted during Summer Games

Multiple flaws in Microsoft macOS apps unpatched despite potential risks

Windows giant tells Cisco Talos it isn't fixing them

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never

Deadline looms: Google Workspace mandates OAuth by September 30

27 days to get your users' third-party apps on Google’s sign-in

AMD reverses course: Ryzen 3000 CPUs will get SinkClose patch after all

Still no love for 1000- or 2000-series

RansomHub-linked EDR-killing malware spotted in the wild

Also: Your external-facing NetSuite sites need a review; five popular malware varieties for Q2, and more

Ransomware batters critical industries, but takedowns hint at relief

Whether attack slowdown continues downward trend is the million dollar question that security researchers can't answer