HPE Aruba Networking Multiple Critical Vulnerabilities - 20240516001¶
Overview¶
HPE Aruba Networking has issued an urgent security advisory, urging customers to patch their Aruba Access Points running InstantOS and ArubaOS 10 due to the discovery of multiple critical vulnerabilities. These flaws could allow unauthenticated attackers to execute malicious code remotely, potentially leading to a complete takeover of the affected devices.
What is vulnerable?¶
CVE | Severity | CVSS | Summary |
---|---|---|---|
CVE-2024-31466 , CVE-2024-31467 | Critical | 9.8 | Buffer Overflow Vulnerabilities in CLI Service |
CVE-2024-31468 , CVE-2024-31469 | Critical | 9.8 | Buffer Overflow Vulnerabilities in Central Communications Service |
CVE-2024-31470 | Critical | 9.8 | Buffer Overflow Vulnerability in SAE Service |
CVE-2024-31471 | Critical | 9.8 | Command Injection Vulnerability in Central Communications Service |
CVE-2024-31472 | Critical | 9.8 | Command Injection Vulnerabilities in Soft AP Daemon Service |
CVE-2024-31473 | Critical | 9.8 | Command Injection Vulnerability in Deauthentication Service |
CVE-2024-31474 | High | 8.2 | Arbitrary File Deletion in CLI Service |
CVE-2024-31475 | High | 8.2 | Arbitrary File Deletion in Central Communications Service |
CVE-2024-31476 , CVE-2024-31477 | High | 9.8 | Authenticated Command Injection in CLI Interface |
CVE-2024-31478 | Medium | 5.3 | Denial-of-Service (DoS) Vulnerabilities in Soft AP Daemon Service |
CVE-2024-31479 | Medium | 5.3 | Denial-of-Service (DoS) Vulnerabilities in Central Communications Service |
CVE-2024-31480 , CVE-2024-31481 | Medium | 5.3 | Denial-of-Service (DoS) Vulnerabilities in CLI Service |
CVE-2024-31482 | Medium | 5.3 | Denial-of-Service (DoS) Vulnerabilities in ANSI Escape Code Service |
CVE-2024-31483 | Medium | 4.9 | Sensitive Information Disclosure in CLI Service |
Affected Software Versions:
- ArubaOS:
- 10.5.x.x: 10.5.1.0 and below
- 10.4.x.x: 10.4.1.0 and below
- InstantOS:
- 8.11.x.x: 8.11.2.1 and below
- 8.10.x.x: 8.10.0.10 and below
- 8.6.x.x: 8.6.0.23 and below
What has been observed?¶
There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):