Security

Patches

Patch up – 4 critical bugs in ArubaOS lead to remote code execution

Ten vulnerabilities in total for admins to apply


Network admins are being urged to patch a bundle of critical vulnerabilities in ArubaOS that lead to remote code execution as a privileged user.

HPE Aruba Networking disclosed ten vulnerabilities this week, four of which are rated "critical" with 9.8 severity ratings.

All four of the critical issues are classified as buffer overflow vulnerabilities, each affecting different underlying components of ArubaOS – the operating system that runs Aruba's wireless solutions.

The four critical vulnerabilities are: 

Proof of concept exploit code hasn't yet been released, but the security advisories say all four components are accessed via Aruba's process application programming interface (PAPI) UDP port (8211), and sending specially crafted packets can lead to arbitrary code execution.

Aruba Mobility Conductors, Mobility Controllers, and WLAN gateways and SD-WAN gateways managed by Aruba Central are affected by the vulnerabilities.

The list of versions that need upgrading are:

There is also a list of software versions that no longer receive technical support but are vulnerable to the security issues:

The four critical vulnerabilities only affect ArubaOS 8.x and a temporary workaround is available while admins make the time to apply all the patches. According to the advisory, enabling the PAPI Security feature using a non-default key will prevent any exploits. 

As for the other six vulnerabilities, these are all graded as medium severity and were reported via the vendor's bug bounty program.

CVE-2024-33513, CVE-2024-33514, and CVE-2024-33515 are all unauthenticated denial of service (DoS) flaws in ArubaOS' AP management service and each have a 5.9 severity score.

CVE-2024-33516 is another unauthenticated DoS bug, but this one instead impacts the auth service, carrying a 5.3 severity score. The researcher credited with the finding, along with the three other DoS bugs, was named as Chancen.

Chancen also reported a fifth unauthenticated DoS vulnerability in CVE-2024-33517. This again carries a 5.3 severity rating and affects the radio frequency manager service.

A researcher named XiaoC from Moonlight Bug Hunter was credited with the final medium severity (5.3) bug – an unauthenticated buffer overflow that leads to DoS in the radio frequency daemon.

Like the four critical bugs, the six medium-severity vulnerabilities can also be mitigated by enabling the PAPI Security feature, but it's always best to apply the patches as soon as possible. ®

Send us news
4 Comments

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Three more vulns spotted in Ivanti CSA, all critical, one 10/10

Patch up, everyone – that admin portal is mighty attractive to your friendly cyberattacker

Apache issues patches for critical Struts 2 RCE bug

More details released after devs allowed weeks to apply fixes

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

OpenWrt orders router firmware updates after supply chain attack scare

A couple of bugs lead to a potentially bad time

Infosec experts divided on AI's potential to assist red teams

Yes, LLMs can do the heavy lifting. But good luck getting one to give evidence

Trump administration wants to go on cyber offensive against China

The US has never attacked Chinese critical infrastructure before, right?

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Perfect 10 directory traversal vuln hits SailPoint's IAM solution

20-year-old info disclosure class bug still pervades security software

Blue Yonder ransomware termites claim credit

Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren't; Polish spy boss arrested, and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains