ArubaOS 10.4.x < 10.4.1.5 / 10.7.0.0 Multiple Vulnerabilities (HPESBNW04722)

critical Nessus Plugin ID 210481

Synopsis

The remote host is missing one or more security updates.

Description

The version of ArubaOS installed on the remote host is prior to 10.4.1.5 / 10.7.0.0. It is, therefore, affected by multiple vulnerabilities as referenced in the HPESBNW04722 advisory.

- Command injection vulnerability in the underlying CLI service could lead to unauthenticated remote code execution by sending specially crafted packets destined to the PAPI (Aruba's Access Point management protocol) UDP port (8211). Successful exploitation of this vulnerability results in the ability to execute arbitrary code as a privileged user on the underlying operating system. (CVE-2024-42509, CVE-2024-47460)

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to ArubaOS version 10.4.1.5 / 10.7.0.0 or later.

See Also

http://www.nessus.org/u?7265dfb7

Plugin Details

Severity: Critical

ID: 210481

File Name: arubaos-aruba-HPESBNW04722.nasl

Version: 1.2

Type: combined

Family: Misc.

Published: 11/7/2024

Updated: 11/8/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.1

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2024-42509

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:arubanetworks:arubaos, cpe:/o:hp:arubaos

Required KB Items: installed_sw/ArubaOS

Exploit Ease: No known exploits are available

Patch Publication Date: 10/18/2024

Vulnerability Publication Date: 11/5/2024

Reference Information

CVE: CVE-2024-42509, CVE-2024-47460

IAVA: 2024-A-0707