First published: Thu Aug 27 2009(Updated: )
The SNMP daemon in ArubaOS 3.3.2.6 in Aruba Mobility Controller does not restrict SNMP access, which allows remote attackers to (1) read all SNMP community strings via SNMP-COMMUNITY-MIB::snmpCommunityName (1.3.6.1.6.3.18.1.1.1.2) or SNMP-VIEW-BASED-ACM-MIB::vacmGroupName (1.3.6.1.6.3.16.1.2.1.3) with knowledge of one community string, and (2) read SNMPv3 user names via SNMP-USER-BASED-SM-MIB or SNMP-VIEW-BASED-ACM-MIB.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Aruba Networks Aruba Mobility Controller | ||
ArubaOS | =3.3.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-7095 is considered to be of high severity due to the potential for remote attackers to gain access to sensitive SNMP community strings.
To fix CVE-2008-7095, restrict SNMP access on the Aruba Mobility Controller or upgrade to a secure version of ArubaOS.
CVE-2008-7095 affects Aruba Mobility Controller running ArubaOS 3.3.2.6.
Yes, CVE-2008-7095 allows remote attackers to access SNMP community strings, leading to unauthorized access.
Yes, CVE-2008-7095 can be exploited over the internet if the SNMP daemon is exposed without proper restrictions.