Skip to content

HPE Aruba Network Products Critical RCE Vulnerabilities - 20240502001

Overview

The WA SOC has been made aware of Critical Remote Code Execution (RCE) Vulnerabilities affecting multiple ArubaOS versions in HPE Aruba Network Products.

What is vulnerable?

Products affected by the listed vulnerabilities:

Mobility Conductor,Mobility Controllers,WLAN Gateways and SD-WAN Gateways managed by Aruba Central with OS versions:
- ArubaOS 10.5.1.0 and below
- ArubaOS 10.4.1.0 and below
- ArubaOS 8.11.2.1 and below
- ArubaOS 8.10.0.10 and below

Products affected by these vulnerabilities and are not patched by this advisory:
- ArubaOS 10.3.x.x: all
- ArubaOS 8.9.x.x: all
- ArubaOS 8.8.x.x: all
- ArubaOS 8.7.x.x: all
- ArubaOS 8.6.x.x: all
- ArubaOS 6.5.4.x: all
- SD-WAN 8.7.0.0-2.3.0.x: all
- SD-WAN 8.6.0.4-2.2.x.x: all

CVE Severity CVSS Summary Dated
CVE-2024-26305 Critical 9.8 Buffer overflow vulnerability in the underlying Utility daemon that could lead to unauthenticated RCE 30/04/2024
CVE-2024-26304 Critical 9.8 Buffer overflow vulnerability in the underlying L2/L3 Management service that could lead to unauthenticated RCE 30/04/2024
CVE-2024-33511 Critical 9.8 Buffer overflow vulnerability in the underlying Automatic Reporting service that could lead to unauthenticated RCE 30/04/2024
CVE-2024-33512 Critical 9.8 Buffer overflow vulnerability in the underlying Local User Authentication Database service that could lead to unauthenticated RCE 30/04/2024
CVE-2024-33513
CVE-2024-33514
CVE-2024-33515
Medium 5.9 Unauthenticated Denial-of-Service (DoS Vulnerabilities in the AP Management Service Accessed via the PAPI Protocol 30/04/2024
CVE-2024-33516 Medium 5.3 Unauthenticated Denial-of-Service (DoS) Vulnerability in Auth Service Accessed via the PAPI Protocol 30/04/2024
CVE-2024-33517 Medium 5.3 Unauthenticated Denial-of-Service (DoS) Vulnerability in the Radio Frequency Manager Service Accessed via the PAPI Protocol 30/04/2024
CVE-2024-33518 Medium 5.3 Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Radio Frequency daemon via the PAPI protocol 30/04/2024

What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

Additional References

  • N/A