Users are advised to upgrade their Aruba InstantOS devices to the latest available software version. Additionally, users can limit the exposure of their systems to these security vulnerabilities by strictly enforcing firewall rules and restricting unnecessary remote access to their Aruba InstantOS systems. Aruba has released an upgrade for ArubaOS 10.2.x, 10.3.x, 10.4.x, 10.5.x and 10.6.x that address these security vulnerabilities. Users are advised to upgrade their Aruba OS devices to the latest available version. Additionally, users can limit the exposure of their systems to these security vulnerabilities by strictly enforcing firewall rules and restricting unnecessary remote access to their Aruba OS systems. NCC researchers have discovered that Aruba InstantOS devices are vulnerable to a series of buffer overflow vulnerabilities. These vulnerabilities can be exploited by an unauthenticated attacker to execute arbitrary commands on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7.1.9 and below; Aruba InstantOS 8.10.x: 8.10.0.1 and below; ArubaOS 10.3.x

Description of the vulnerability

The vulnerability exists in a function that handles security-related operations. Specifically, the function requests for a list of MAC addresses from the underlying operating system and is vulnerable to buffer overflow attacks. This allows an unauthenticated attacker to execute arbitrary commands on the underlying operating system of Aruba InstantOS 6.4.x: 6.4.4.8-4.2.4.20 and below; Aruba InstantOS 6.5.x: 6.5.4.23 and below; Aruba InstantOS 8.6.x: 8.6.0.18 and below; Aruba InstantOS 8.7.x: 8.7..1 9 and below; Aruba InstantOS 810 x: 810 0 1 3 and below; Aruba OS 10 .3 .x

Summary

Aruba has released a patch for ArubaOS 6.4.x, 7.x, 8.x and 10.x to address buffer overflow vulnerabilities that could be exploited by an unauthenticated attacker to execute arbitrary commands on the underlying operating system of Aruba InstantOS devices.

Vulnerability Overview

The vulnerabilities exist in the handling of UDP packets that use the same source and destination ports. An attacker can send a packet with a spoofed source address to trigger a buffer overflow on the underlying operating system. The amount of data that can be sent is limited by the size of the buffer for reception, but enough data can be sent to cause arbitrary commands to execute.

Timeline

Published on: 10/07/2022 18:15:00 UTC
Last modified on: 11/09/2022 03:59:00 UTC

References