If you have installed a version of Aruba InstantOS that is prior to the release listed above, you will need to upgrade to a supported release in order to continue operating your network with that particular software. Unauthorized access to the AP via the SSID, and the injection of malicious code into the management interface is possible. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected AP of Aruba InstantOS 6.4.x: 126.96.36.199-188.8.131.52 and below; Aruba InstantOS 6.5.x: 184.108.40.206 and below; Aruba InstantOS 8.6.x: 220.127.116.11 and below; Aruba InstantOS 8.7.x: 18.104.22.168 and below; Aruba InstantOS 8.10.x: 22.214.171.124 and below; ArubaOS 10.3.x: 10.3.1.0 and below; Aruba has released upgrades for Aruba InstantOS that address this security vulnerability.
What versions of Aruba InstantOS are affected by this vulnerability?
This vulnerability is a result of public disclosure and was patched in Aruba InstantOS 126.96.36.199-188.8.131.52, Aruba InstantOS 184.108.40.206 and below, Aruba InstantOS 220.127.116.11 and below, Aruba InstantOS 18.104.22.168 and below, Aruba InstantOS 22.214.171.124 and below and Aruba OS 10 3 1 0 and below systems that have not been updated to the latest release of their supported software version according to the list above.
What to do if you are already running an insecure version of InstantOS firmware?
If you are already running an insecure version of Aruba InstantOS, you will need to upgrade to a supported release in order to continue operating your network with that particular software. Unauthorized access to the AP via the SSID, and the injection of malicious code into the management interface is possible. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected AP of Aruba InstantOS 6.4.x: 126.96.36.199-188.8.131.52 and below; Aruba InstantOS 6.5.x: 184.108.40.206 and below; Aruba InstantOS 8.6.x: 8.6.0-18 and below; Aruba InstantOS 8 7x: 8 7 1 x 9 and below; Aruba InstantOS 8 10x: 8 10 0 x 1 and below; Aruba OS 10 3 x : 10 3 1 x 0 and below; this could result in loss of network connectivity or other issues on your network, which can be detrimental to your business operations
How do I know if my system is vulnerable?
If you are unsure whether your system is vulnerable, please follow these steps:
1. Click on the Administrative Tools icon.
2. Select Services and Applications.
3. Check the version of Aruba InstantOS installed on your system (for example, 220.127.116.11-18.104.22.168). If this version of Aruba InstantOS is not listed in the Services and Applications window, it means that no upgrades are available for this particular release of software to address this issue and your system is not affected by CVE-2022-37894
What is the Aruba InstantOS vulnerability?
The Aruba InstantOS vulnerability is a flaw that can be exploited by an attacker who is able to connect to the AP through the SSID. If successful, the attacker can inject malicious code into the management interface of the affected AP and disrupt normal operations.
Why is this important? The exploitation of vulnerabilities like these could lead to a significant disruption in your network.
S.M.A.R.T. factors are characteristics that can help you prioritize responses for security vulnerabilities and determine the severity of the issue at hand.
The following S.M.A.R.T attributes can help you determine how severe the issue is:
1) Scope- The number of systems/endpoints impacted 2) Prevalence- How prevalent is the threat in your environment
3) Access- What level of access does this particular vulnerability have on your network 4) Attack surface- How many vectors does it take to exploit the vulnerability 5) Respondability- If a patch is released, what impact might it have on operations 6) Recovery time objective (RTO)- How much time will it take to recover from an attack 7) Likelihood of occurrence (LOO)-How likely will this happen? 8) Probability of compromise (POC)- How many points of entry are there? 9) Effect- What are the potential effects upon exploitation 10) Risk level- Is this risk high or low
Published on: 10/07/2022 19:15:00 UTC
Last modified on: 11/09/2022 04:00:00 UTC