iTnews Asia
  • Home
  • News
  • Security

Protocol bug leaves Aruba access points exposed

Protocol bug leaves Aruba access points exposed

Not all products can be patched.

By Richard Chirgwin on May 12, 2023 11:29AM

HPE enterprise wi-fi business unit Aruba Networks has disclosed the latest round of security patches for its access points.

Eight buffer overflow vulnerabilities were found in “multiple underlying services” accessible via Aruba’s access point management protocol, PAPI, accessed through UDP port 8211.

Crafted packets sent to port 8211 could trigger the vulnerabilities, giving a remote attacker arbitrary code execution on the products’ operating system, as a privileged user.

The bugs are present in ArubaOS and InstantOS, and the company warned that not all branches of these operating systems can be patched.

“Due to the structure of these specific vulnerabilities, the only branches to receive a patch were ArubaOS 10.4.0.0 and above; InstantOS 8.11.x: 8.11.0.0 and above; and Aruba InstantOS 8.10.0.3 and above," the company wrote.

For customers unable to upgrade to fixed branches, there are some workarounds.

In devices running InstantOS 8.x or 6.x code, admins can enable cluster security to block the exploit.

However, this is not an option for ArubaOS 10 devices; instead, UDP port 8211 must be blocked from all untrusted networks, the company said.

There’s also a high severity denial-of-service in PAPI, CVE-2023-22787, again in a service accessed using PAPI. Aruba doesn’t yet have a patch, but blocking UDP port 8821 again provides mitigation.

There are also three high-severity command injection bugs (CVE-2023-22788, CVE-2023-22789, CVE-2023-22790) in the Aruba InstantOS and ArubaOS 10 command line interface which, if exploited, provide remote code execution as a privileged user of the operating system.

The bugs were reported to Aruba by Erik de Jong and Daniel Jensen via its bug bounty program, and by Zack Colgan of ClearBearing.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
aruba networks hpe security

Related Articles

  • Malicious AI inputs are creating a new and critical security threat
  • Beware the pitfalls of using a ‘DIY security’ approach
  • AI transforms cyberattacks, but human trust remains the weakest link
  • How severe will ransomware attacks become in 2026?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Malicious AI inputs are creating a new and critical security threat

Malicious AI inputs are creating a new and critical security threat

Singapore issues advisory for FIs to mitigate quantum computing risks

Singapore issues advisory for FIs to mitigate quantum computing risks

PhilHealth estimates 13 to 20 million members affected by data breach

PhilHealth estimates 13 to 20 million members affected by data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.