Aruba Networks has released a fix for six critical vulnerabilities found in a number of its products, and is now urging users to apply the patch immediately and avoid being targeted by cybercriminals.
The vulnerabilities all have a severity score of 9.8, giving them the “critical” rating.
According to the company, these vulnerabilities can be abused to grant malicious third parties elevated privileges and the ability to run arbitrary code, remotely.
Patches and versions
The vulnerabilities that were patched are: CVE-2023-22747, CVE-2023-22748, CVE-2023-22749, and CVE-2023-22750, CVE-2023-22751 and CVE-2023-22752. They were discovered by cybersecurity researcher Erik de Jong, in these Aruba products: ArubaOS 126.96.36.199 and below, ArubaOS 188.8.131.52 and below, ArubaOS 10.3.1.0 and below, SD-WAN 184.108.40.206-220.127.116.11 and below.
To make sure they keep their endpoints (opens in new tab) patched and secured, users should update the products to these versions: ArubaOS 18.104.22.168 and above, ArubaOS 22.214.171.124 and above, ArubaOS 10.3.1.1 and above, and SD-WAN 126.96.36.199-188.8.131.52 and above.
Users shold also keep in mind that some of the products reached end-of-life status, and as such will not be getting the updates: ArubaOS 6.5.4.x, ArubaOS 8.7.x.x, ArubaOS 8.8.x.x, ArubaOS 8.9.x.x, and SD-WAN 184.108.40.206-2.2.x.x.
> Severe vulnerabilities expose wireless access points to attack (opens in new tab)
> Critical vulnerabilities discovered in millions of network switches (opens in new tab)
> These are the best malware protections at the moment (opens in new tab)
Users are advised to use the software that hasn’t yet reached end-of-life and receives updates.
Those that can’t apply the patch for whatever reasons can enable “Enhanced PAPI Security” mode using a non-default key, which was said to be a valid workaround, BleepingComputer reported. However, Aruba’s latest fix addresses another 15 high-severity and eight medium-severity flaws, so applying the fix is still highly recommended.
Aruba said there’s no evidence of these flaws being abused in the wild at the moment, but users should be on their guard.
- Here's our list of the best firewalls (opens in new tab) right now
Via: BleepingComputer (opens in new tab)