Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

ArubaOS Multiple Vulnerabilities (ARUBA-PSA-2016-007)

Information

Severity

Severity

High

Family

Family

General

CVSSv2 Base

CVSSv2 Base

8.3

CVSSv2 Vector

CVSSv2 Vector

AV:A/AC:L/Au:N/C:C/I:C/A:C

Solution Type

Solution Type

Vendor Patch

Created

Created

7 years ago

Modified

Modified

5 years ago

Summary

ArubaOS is prone to multiple vulnerabilities A buffer over-read vulnerability allows an unauthenticated user to read from uninitialized memory locations. Based on analysis of the flaw, Aruba does not believe that this memory is likely to contain sensitive information. The Broadcom Wi-Fi driver used in the AP-2xx series access points allows attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted wireless control message packets. The attacker must be joined to the network (wired or wireless) - this vulnerability may not be exercised by an unauthenticated user against a WPA2 network. A flaw in the ISC DHCP server allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet. The flawed DHCP server is incorporated into ArubaOS. If the DHCP server is enabled in an Aruba mobility controller, an attacker could cause it to crash. ArubaOS would automatically restart the process. However, DHCP services would be disrupted temporarily.

Affected Software

Affected Software

-- ArubaOS 6.3 prior to 6.3.1.21 - - ArubaOS 6.4.2.x prior to 6.4.2.16 - - ArubaOS 6.4.3.x prior to 6.4.3.7 - - ArubaOS 6.4.4.x prior to 6.4.4.5

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Upgrade to one of the following software versions: - - ArubaOS 6.3.1.21 or later - - ArubaOS 6.4.2.16 or later - - ArubaOS 6.4.3.7 or later - - ArubaOS 6.4.4.5 or later

Common Vulnerabilities and Exposures (CVE)