HPE Aruba Networking Addresses Severe Vulnerabilities in Access Points

CVE-2023-45614 - HPE Aruba Networking

HPE Aruba Networking has released security updates to address multiple critical vulnerabilities in its Aruba Access Points running InstantOS and ArubaOS 10. These vulnerabilities could potentially allow unauthorized remote attackers to execute arbitrary code and take control of affected systems.

Critical Flaws in Soft AP Daemon and AP Certificate Management Services

The most severe vulnerabilities with a CVSS score of 9.8, identified as CVE-2024-42393, CVE-2024-42394, and CVE-2024-42395, reside in the Soft AP Daemon Service and AP Certificate Management Service. Successful exploitation of these flaws could enable attackers to remotely execute commands on the underlying operating system, leading to a complete system compromise.

Other Vulnerabilities and Mitigations

In addition to the critical flaws, the security advisory also addresses several moderate vulnerabilities in the OpenSSH daemon and PAPI protocol. These vulnerabilities could lead to remote code execution and denial-of-service attacks, respectively.

HPE Aruba Networking strongly recommends that customers upgrade their Access Points to the latest software versions to mitigate these risks. Specific patches and updated versions are available for InstantOS 8.12.x.x, InstantOS 8.10.x.x, ArubaOS 10.6.x.x, and ArubaOS 10.4.x.x.

Urgency for Older Versions

Customers running end-of-maintenance software versions are particularly vulnerable, as these versions are not covered by the security advisory. HPE Aruba Networking urges users of these older versions to migrate to supported branches as soon as possible.

Workarounds and Additional Recommendations

While upgrading is the most effective solution, HPE Aruba Networking has also provided workarounds for some vulnerabilities. These involve enabling cluster security or blocking access to specific ports from untrusted networks.

Furthermore, HPE Aruba Networking recommends restricting access to CLI and web-based management interfaces to a dedicated network segment or VLAN and implementing firewall policies for added protection.

For detailed information on the vulnerabilities, affected products, and remediation steps, please refer to the official HPE security advisory.

Related Posts: