-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Aruba Product Security Advisory =============================== Advisory ID: ARUBA-PSA-2019-004 CVE: CVE-2018-7081, CVE-2019-5314, CVE-2019-5315 Publication Date: 2019-Sep-03 Status: Confirmed Revision: 1 Title ===== Aruba Mobility Controller Multiple Remote Code Execution Vulnerabilities Overview ======== Aruba has released updates to ArubaOS that address serious vulnerabilities present in some versions running on the Aruba Mobility Controller. An attacker could use these vulnerabilities to execute arbitrary code on the underlying operating system with full system privileges. Affected Products ================= These vulnerabilities affect Aruba Mobility Controllers running the following firmware versions: - ArubaOS 6.x prior to 6.4.4.21 - ArubaOS 6.5.x prior to 6.5.4.13 - ArubaOS 8.x prior to 8.2.2.6 - ArubaOS 8.3.0.x prior to 8.3.0.7 - ArubaOS 8.4.0.x prior to 8.4.0.3 Details ======= Memory corruption in network-listening component (CVE-2018-7081) ---------------------------------------------------------------- A remote code execution vulnerability is present in network-listening components in some versions of ArubaOS. An attacker with the ability to transmit specially-crafted IP traffic to a mobility controller could exploit this vulnerability and cause a process crash or to execute arbitrary code within the underlying operating system with full system privileges. Such an attack could lead to complete system compromise. The ability to transmit traffic to an IP interface on the mobility controller is required to carry out an attack. The attack leverages the PAPI protocol (UDP port 8211). If the mobility controller is only bridging L2 traffic to an uplink and does not have an IP address that is accessible to the attacker, it cannot be attacked. Internal reference: ATLWL-5 Severity: HIGH CVSSv3 Overall Score: 8.1 CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H Workaround: If updating to the latest version is not possible, an administrator can isolate the mobility controller using network segmentation techniques. Blocking access to UDP port 8211 will mitigate this attack. If a mobility controller is communicating with wireless access points and Control Plane Security (CPSEC) is NOT enabled, UDP 8211 is required for AP communication. AMON communication between a mobility controller and AirWave also uses UDP 8211. Use caution when blocking access to this port. Discovery: Aruba thanks independent security researchers Pedro Guillen Nuñez and Juan Manuel Fernandez Torres (@TheXC3LL) for discovering this vulnerability and reporting it to Aruba. Resolution: Fixed in ArubaOS 6.4.4.21, 6.5.4.13, 8.2.2.6, 8.3.0.7, 8.4.0.3, 8.5.0.0 HTTP Response Splitting (CRLF injection) and Reflected XSS (CVE-2019-5314) -------------------------------------------------------------------------- Some web components in the ArubaOS software are vulnerable to HTTP Response splitting (CRLF injection) and Reflected XSS. An attacker would be able to accomplish this by sending certain URL parameters that would trigger this vulnerability. Internal reference: ATLWL-27 Severity: MEDIUM CVSSv3 Overall Score: 5.4 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N Workaround: If updating to the latest version is not possible, an administrator can isolate the mobility controller using network segmentation techniques. Discovery: Aruba thanks independent security researcher @mongobug for discovering this vulnerability and reporting it through the BugCrowd managed bug bounty program. Resolution: Fixed in ArubaOS 6.4.4.20, 6.5.4.11, 8.2.1.0, 8.3 Authenticated command injection (CVE-2019-5315) ----------------------------------------------- A command injection vulnerability is present in the web management interface of ArubaOS that permits an authenticated user to execute arbitrary commands on the underlying operating system. A malicious administrator could use this ability to install backdoors or change system configuration in a way that would not be logged. This vulnerability only affects ArubaOS 8.x. Internal reference: ATLWL-28 Severity: HIGH CVSSv3 Overall Score: 6.5 CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Workaround: None. Discovery: Aruba thanks independent security researcher @mongobug for discovering this vulnerability and reporting it through the BugCrowd managed bug bounty program. Resolution: Fixed in ArubaOS 8.3.0.0 Resolution ========== All reported vulnerabilities are fixed in the following ArubaOS software releases: - ArubaOS 6.4.4.21 - ArubaOS 6.5.4.13 - ArubaOS 8.2.2.6 - ArubaOS 8.3.0.7 - ArubaOS 8.4.0.3 - ArubaOS 8.5.0.0 Exploitation and Public Discussion ================================== Aruba is not aware of any public discussion or exploit code related to these issues. CVE-2018-7081 may become public in a blog post in September, 2019. Revision History ================ Revision 1 / 2019-Sep-03 / Initial release Aruba SIRT Security Procedures ============================== Complete information on reporting security vulnerabilities in Aruba Networks products, obtaining assistance with security incidents is available at: http://www.arubanetworks.com/support-services/security-bulletins/ For reporting *NEW* Aruba Networks security issues, email can be sent to aruba-sirt(at)hpe.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found at: http://www.arubanetworks.com/support-services/security-bulletins/ (c) Copyright 2019 by Aruba, a Hewlett Packard Enterprise company. This advisory may be redistributed freely after the release date given at the top of the text, provided that the redistributed copies are complete and unmodified, including all data and version information. -----BEGIN PGP SIGNATURE----- iQEzBAEBCAAdFiEEMd5pP5EnbG7Y0fo5mP4JykWFhtkFAl1mgM8ACgkQmP4JykWF htmg/Af+LcmKI0v7xJalEFSeuTJxxz0VESJ0WblMlp2ZGO2rOsUx8kEalpnBCQAn 19lvVvRGXwpSjNMDhfpfZRFHY7cOLGY0a2SZU/OWmkPTPoBxxJp7FC1xv8lxTDms sFJw31E2WXP6nmXYF2t6XVVhYHA7Fb0ZnfPGZodoToz8S4GkX37fn49lMtpZsgHe RvS4JC+9/gBkIDjhHuSZiH8Fxnbkv6BI50Bnfa3iHScsEpGIv2KyHfluyEFdS8jd RFkQAixpgLNQrGxAjHjZI/o7SOLFlK9gzc1F0SpgzUop7RwzqVN412OpkeQPVFnF k5swlHSmRwDs83tG5PRkUe5/GwDmIQ== =ALbe -----END PGP SIGNATURE-----