10 Vulnerabilities (Including 4 Critical) Expose HPE Aruba Devices to RCE Threats

hpe aruba

In a reassuring turn of events for cybersecurity, HPE Aruba Networking has swiftly responded to safeguard its systems against potential remote code execution (RCE) attacks. The company has taken proactive measures by releasing critical security updates, fortifying ArubaOS against vulnerabilities that could have posed significant risks to users.

A total of 10 security flaws were identified, with four of them deemed critical in severity. These vulnerabilities, bearing CVE identifiers such as CVE-2024-26304, CVE-2024-26305, CVE-2024-33511, and CVE-2024-33512, were discovered to have the potential for unauthenticated buffer overflow exploits.

Understandably, such vulnerabilities could have provided an entry point for malicious actors to execute arbitrary code on affected systems. However, thanks to the swift action by HPE Aruba, these vulnerabilities are now effectively neutralized.

The vulnerabilities primarily affected the ArubaOS ecosystem, including Mobility Conductor, Mobility Controllers, WLAN Gateways, and SD-WAN Gateways managed by Aruba Central. The impact extended across several software versions, highlighting the critical nature of the security updates.

Users of ArubaOS versions 10.5.1.0 and below, 10.4.1.0 and below, as well as 8.11.2.1 and below, were potentially at risk. Additionally, users of software versions that had reached end-of-maintenance status were also vulnerable. This included various iterations of ArubaOS and SD-WAN software, underscoring the importance of staying vigilant in the face of evolving threats.

The discovery of these vulnerabilities was credited to the diligent efforts of security researcher Chancen, who promptly reported seven out of the ten identified issues. Their contributions have been instrumental in ensuring the swift resolution of these critical security gaps.

rce

In response to these findings, HPE Aruba has recommended immediate action for users to safeguard their systems. Applying the latest security fixes is paramount to mitigating potential threats effectively. Additionally, the company has provided temporary workarounds, including enabling the Enhanced PAPI Security feature with a non-default key for users of ArubaOS 8.x.

This proactive approach not only highlights HPE Aruba’s commitment to user security but also underscores the collaborative efforts between the cybersecurity community and technology providers in ensuring a safer digital landscape.

As cyber threats continue to evolve in sophistication, the importance of robust cybersecurity measures cannot be overstated. With HPE Aruba’s swift response and the vigilance of security researchers like Chancen, users can navigate the digital realm with greater confidence, knowing that their systems are fortified against potential vulnerabilities.

In conclusion, the proactive measures taken by HPE Aruba Networking serve as a testament to the company’s dedication to user safety and security. By promptly addressing critical vulnerabilities, they have not only protected their users but also reinforced the resilience of their systems against emerging threats. As we navigate the ever-changing landscape of cybersecurity, such collaborative efforts pave the way for a safer and more secure digital future.

1 thought on “10 Vulnerabilities (Including 4 Critical) Expose HPE Aruba Devices to RCE Threats”

  1. Pingback: Google Passkeys Revolutionize Online Security with Over 400 Million Users

Comments are closed.

Scroll to Top