CVE-2017-8946: HPE Aruba AirWave Glass Product Remote Code Execution Vulnerability

The AirWave network management platform provides visibility into wired and wireless networks, supporting mobile devices and applications. HPE Aruba has provided AirWave Glass upgrade version 1.0.1-1, and NSFOCUS released the HPE Aruba AirWave Glass Remote Code Implementation Vulnerability Threat Announcement.

HPE Aruba AirWave Glass Remote Code Execution Vulnerability Threat Announcement

Local time on May 24, 2017 , HP official release of the security notice, disclosed a HPE Aruba AirWave Glass products exist on the implementation of remote code loopholes, CVE number CVE-2017-8946, CVSS ratings are as follows:

CVE V3 standard V3 score V2 standard V2 score
CVE-2017-8946 CVSS: 3.0 / AV: N / AC: H / PR: N / UI: R / S: C / C: L / I: L / A: H 7.3 (AV: N / AC: H / Au: N / C: P / I: P / A: C) 6.6

For this security issue, HP official has released a new version, the official website is as follows:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03751en_us

HPE Aruba AirWave network management

The AirWave network management platform provides visibility into wired and wireless networks, supporting mobile devices and applications. AirWave proactively monitors the status and performance of all connections and gives IT staff the information they need to support digital workplaces.

Sphere of influence

Affected versions Aruba Airwave Software Glass Version v1.0.0 and 1.0.1

Note: Only AirWave Glass is affected and the standard AirWave is not affected

Unaffected version of Aruba AirWave Glass version 1.0.1-1

How to prevent

HPE Aruba has provided the new AirWave Glass version 1.0.1-1. Users can download new OVA files at https://support.arubanetworks.com or upgrade them at the product’s administrator interface .

Because the vulnerability is very difficult to detect, it is strongly recommended that the affected user download the new file to reinstall the product to protect the vulnerability.

Reference link:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03751en_us