Skip to main content

HPE Aruba Networking Releases Critical Security Updates for Instant AOS-8 and AOS-10 in Access Points

Five vulnerabilities could lead to remote code execution and arbitrary command execution in multiple series of Aruba Access Points

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Five vulnerabilities could lead to remote code execution and arbitrary command execution in multiple series of Aruba Access Points


Threat details

End of maintenance ArubaOS software versions are also affected

Software versions that are End of Support Life (EoSL) are also affected by these vulnerabilities and are not addressed by this advisory. HPE Aruba Networking strongly recommends all customers running End of Support Life (EoSL) software to upgrade to a supported version as soon as possible.


Introduction

Hewlett Packard Enterprise (HPE) Aruba Networking has issued an advisory that addresses 5 vulnerabilities that affect Aruba Access Points (APs) product lines that use Instant AOS (ArubaOS) 8 and 10. AOS is a distributed network operating system working with Aruba Central that controls APs and optional gateways.

Two critical command injection vulnerabilities and three high severity vulnerabilities could be exploited by an attacker to achieve remote code execution (RCE). Successful exploitation could lead to the ability to execute arbitrary code as a privileged user on the underlying operating system.

Access Points are popular targets for attackers

Some access points and gateways are internet-facing by design and present an attractive target to facilitate initial access to an organisation's network, with exploitation by attackers often reported soon after official disclosure. The NHS England National CSOC assesses exploitation as highly likely, should a proof-of-concept (PoC) exploit be publicly released.


Remediation advice

Affected organisations are encouraged to review the HPE Security Advisory HPESBNW04722 rev.1 - HPE Aruba Networking Access Points Multiple Vulnerabilities and apply any relevant updates or workarounds.



CVE Vulnerabilities

Last edited: 7 November 2024 1:26 pm