Security

Patches

Patch up – 4 critical bugs in ArubaOS lead to remote code execution

Ten vulnerabilities in total for admins to apply


Network admins are being urged to patch a bundle of critical vulnerabilities in ArubaOS that lead to remote code execution as a privileged user.

HPE Aruba Networking disclosed ten vulnerabilities this week, four of which are rated "critical" with 9.8 severity ratings.

All four of the critical issues are classified as buffer overflow vulnerabilities, each affecting different underlying components of ArubaOS – the operating system that runs Aruba's wireless solutions.

The four critical vulnerabilities are: 

Proof of concept exploit code hasn't yet been released, but the security advisories say all four components are accessed via Aruba's process application programming interface (PAPI) UDP port (8211), and sending specially crafted packets can lead to arbitrary code execution.

Aruba Mobility Conductors, Mobility Controllers, and WLAN gateways and SD-WAN gateways managed by Aruba Central are affected by the vulnerabilities.

The list of versions that need upgrading are:

There is also a list of software versions that no longer receive technical support but are vulnerable to the security issues:

The four critical vulnerabilities only affect ArubaOS 8.x and a temporary workaround is available while admins make the time to apply all the patches. According to the advisory, enabling the PAPI Security feature using a non-default key will prevent any exploits. 

As for the other six vulnerabilities, these are all graded as medium severity and were reported via the vendor's bug bounty program.

CVE-2024-33513, CVE-2024-33514, and CVE-2024-33515 are all unauthenticated denial of service (DoS) flaws in ArubaOS' AP management service and each have a 5.9 severity score.

CVE-2024-33516 is another unauthenticated DoS bug, but this one instead impacts the auth service, carrying a 5.3 severity score. The researcher credited with the finding, along with the three other DoS bugs, was named as Chancen.

Chancen also reported a fifth unauthenticated DoS vulnerability in CVE-2024-33517. This again carries a 5.3 severity rating and affects the radio frequency manager service.

A researcher named XiaoC from Moonlight Bug Hunter was credited with the final medium severity (5.3) bug – an unauthenticated buffer overflow that leads to DoS in the radio frequency daemon.

Like the four critical bugs, the six medium-severity vulnerabilities can also be mitigated by enabling the PAPI Security feature, but it's always best to apply the patches as soon as possible. ®

Send us news
4 Comments

Admins better Spring into action over latest critical open source vuln

Patch up: The Spring framework dominates the Java ecosystem

macOS HM Surf vuln might already be under exploit by major malware family

Like keeping your camera and microphone private? Patch up

Tech firms to pay millions in SEC penalties for misleading SolarWinds disclosures

Unisys, Avaya, Check Point, and Mimecast settled with the agency without admitting or denying wrongdoing

Jetpack fixes 8-year-old flaw affecting millions of WordPress sites

Also, new EU cyber reporting rules are live, exploiters hit the gas pedal, free PDNS for UK schools, and more

Here's a NIS2 compliance checklist since no one cares about deadlines anymore

Only two EU members have completed the transposition into domestic law

Thousands of Fortinet instances vulnerable to actively exploited flaw

No excuses for not patching this nine-month-old issue

Senator accuses sloppy domain registrars of aiding Russian disinfo campaigns

Also, Change Healthcare sets a record, cybercrime cop suspect indicted, a new Mallox decryptor, and more

CISA adds fresh Ivanti vuln, critical Fortinet bug to hall of shame

Usual three-week window to address significant risks to federal agencies applies

Samsung phone users under attack, Google warns

Don't ignore this nasty zero day exploit says TAG

Penn State pays DoJ $1.25M to settle cybersecurity compliance case

Fight On, State? Not this time

Akira ransomware is encrypting victims again following pure extortion fling

Crooks revert to old ways for greater efficiency

US and UK govts warn: Russia scanning for your unpatched vulnerabilities

Also, phishing's easier over the phone, and your F5 cookies might be unencrypted, and more