HPE Aruba Network Products Critical RCE Vulnerabilities - 20240502001¶
Overview¶
The WA SOC has been made aware of Critical Remote Code Execution (RCE) Vulnerabilities affecting multiple ArubaOS versions in HPE Aruba Network Products.
What is vulnerable?¶
Products affected by the listed vulnerabilities:
Mobility Conductor,Mobility Controllers,WLAN Gateways and SD-WAN Gateways managed by Aruba Central with OS versions:
- ArubaOS 10.5.1.0 and below
- ArubaOS 10.4.1.0 and below
- ArubaOS 8.11.2.1 and below
- ArubaOS 8.10.0.10 and below
Products affected by these vulnerabilities and are not patched by this advisory:
- ArubaOS 10.3.x.x: all
- ArubaOS 8.9.x.x: all
- ArubaOS 8.8.x.x: all
- ArubaOS 8.7.x.x: all
- ArubaOS 8.6.x.x: all
- ArubaOS 6.5.4.x: all
- SD-WAN 8.7.0.0-2.3.0.x: all
- SD-WAN 8.6.0.4-2.2.x.x: all
CVE | Severity | CVSS | Summary | Dated |
---|---|---|---|---|
CVE-2024-26305 | Critical | 9.8 | Buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated RCE | 30/04/2024 |
CVE-2024-26304 | Critical | 9.8 | Buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated RCE | 30/04/2024 |
CVE-2024-33511 | Critical | 9.8 | Buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated RCE | 30/04/2024 |
CVE-2024-33512 | Critical | 9.8 | Buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated RCE | 30/04/2024 |
CVE-2024-33513 CVE-2024-33514 CVE-2024-33515 |
Medium | 5.9 | Unauthenticated Denial-of-Service (DoS Vulnerabilities in the AP Management Service Accessed via the PAPI Protocol | 30/04/2024 |
CVE-2024-33516 | Medium | 5.3 | Unauthenticated Denial-of-Service (DoS) Vulnerability in Auth Service Accessed via the PAPI Protocol | 30/04/2024 |
CVE-2024-33517 | Medium | 5.3 | Unauthenticated Denial-of-Service (DoS) Vulnerability in the Radio Frequency Manager Service Accessed via the PAPI Protocol | 30/04/2024 |
CVE-2024-33518 | Medium | 5.3 | Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Radio Frequency daemon via the PAPI protocol | 30/04/2024 |
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):
Additional References¶
- N/A