Aruba Networks has released a fix for six critical vulnerabilities found in a number of its products, and is now urging users to apply the patch immediately and avoid being targeted by cybercriminals.
The vulnerabilities all have a severity score of 9.8, giving them the “critical” rating.
According to the company, these vulnerabilities can be abused to grant malicious third parties elevated privileges and the ability to run arbitrary code, remotely.
Patches and versions
The vulnerabilities that were patched are: CVE-2023-22747, CVE-2023-22748, CVE-2023-22749, and CVE-2023-22750, CVE-2023-22751 and CVE-2023-22752. They were discovered by cybersecurity researcher Erik de Jong, in these Aruba products: ArubaOS 22.214.171.124 and below, ArubaOS 126.96.36.199 and below, ArubaOS 10.3.1.0 and below, SD-WAN 188.8.131.52-184.108.40.206 and below.
To make sure they keep their endpoints (opens in new tab) patched and secured, users should update the products to these versions: ArubaOS 220.127.116.11 and above, ArubaOS 18.104.22.168 and above, ArubaOS 10.3.1.1 and above, and SD-WAN 22.214.171.124-126.96.36.199 and above.
Users shold also keep in mind that some of the products reached end-of-life status, and as such will not be getting the updates: ArubaOS 6.5.4.x, ArubaOS 8.7.x.x, ArubaOS 8.8.x.x, ArubaOS 8.9.x.x, and SD-WAN 188.8.131.52-2.2.x.x.
Users are advised to use the software that hasn’t yet reached end-of-life and receives updates.
Those that can’t apply the patch for whatever reasons can enable “Enhanced PAPI Security” mode using a non-default key, which was said to be a valid workaround, BleepingComputer reported. However, Aruba’s latest fix addresses another 15 high-severity and eight medium-severity flaws, so applying the fix is still highly recommended.
Aruba said there’s no evidence of these flaws being abused in the wild at the moment, but users should be on their guard.
Via: BleepingComputer (opens in new tab)
Originally published at www.theshocknews.com