Security

Patches

Patch up – 4 critical bugs in ArubaOS lead to remote code execution

Ten vulnerabilities in total for admins to apply


Network admins are being urged to patch a bundle of critical vulnerabilities in ArubaOS that lead to remote code execution as a privileged user.

HPE Aruba Networking disclosed ten vulnerabilities this week, four of which are rated "critical" with 9.8 severity ratings.

All four of the critical issues are classified as buffer overflow vulnerabilities, each affecting different underlying components of ArubaOS – the operating system that runs Aruba's wireless solutions.

The four critical vulnerabilities are: 

Proof of concept exploit code hasn't yet been released, but the security advisories say all four components are accessed via Aruba's process application programming interface (PAPI) UDP port (8211), and sending specially crafted packets can lead to arbitrary code execution.

Aruba Mobility Conductors, Mobility Controllers, and WLAN gateways and SD-WAN gateways managed by Aruba Central are affected by the vulnerabilities.

The list of versions that need upgrading are:

There is also a list of software versions that no longer receive technical support but are vulnerable to the security issues:

The four critical vulnerabilities only affect ArubaOS 8.x and a temporary workaround is available while admins make the time to apply all the patches. According to the advisory, enabling the PAPI Security feature using a non-default key will prevent any exploits. 

As for the other six vulnerabilities, these are all graded as medium severity and were reported via the vendor's bug bounty program.

CVE-2024-33513, CVE-2024-33514, and CVE-2024-33515 are all unauthenticated denial of service (DoS) flaws in ArubaOS' AP management service and each have a 5.9 severity score.

CVE-2024-33516 is another unauthenticated DoS bug, but this one instead impacts the auth service, carrying a 5.3 severity score. The researcher credited with the finding, along with the three other DoS bugs, was named as Chancen.

Chancen also reported a fifth unauthenticated DoS vulnerability in CVE-2024-33517. This again carries a 5.3 severity rating and affects the radio frequency manager service.

A researcher named XiaoC from Moonlight Bug Hunter was credited with the final medium severity (5.3) bug – an unauthenticated buffer overflow that leads to DoS in the radio frequency daemon.

Like the four critical bugs, the six medium-severity vulnerabilities can also be mitigated by enabling the PAPI Security feature, but it's always best to apply the patches as soon as possible. ®

Send us news
4 Comments

Nominet probes network intrusion linked to Ivanti zero-day exploit

Unauthorized activity detected, but no backdoors found

Cryptojacking, backdoors abound as fiends abuse Aviatrix Controller bug

This is what happens when you publish PoCs immediately, hm?

Zero-day exploits plague Ivanti Connect Secure appliances for second year running

Factory resets and apply patches is the advice amid fortnight delay for other appliances

I tried hard, but didn't fix all of cybersecurity, admits outgoing US National Cyber Director

In colossal surprise, ONCD boss Harry Coker says more work is needed

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

MediaTek rings in the new year with a parade of chipset vulns

Manufacturers should have had ample time to apply the fixes

Hulk smash Musk and Zuck! Actor Mark Ruffalo and non-billionaire pals back network tech underpinning Bluesky

Free Our Feeds solicits funds to foster AT Protocol that powers decentralized social media

DEF CON's hacker-in-chief faces fortune in medical bills after paralyzing neck injury

Marc Rogers is 'lucky to be alive'

Datacus extractus: Harry Potter publisher breached without resorting to magic

PLUS: Allstate sued for allegedly tracking drivers; Dutch DDoS; More fake jobs from Pyongyang; and more

Security pros baited with fake Windows LDAP exploit traps

Tricky attackers trying yet again to deceive the good guys on home territory

UK gives Openreach £289M for 4 rural broadband contracts in 'gigabit by 2030' push

Nation's dominant broadband plumber wins ahead of altnets

Azure networking snafu enters day 2, some services still limping

Struggling to connect to the cloud? You’re not alone