First published: Fri Sep 13 2019(Updated: )
A remote code execution vulnerability is present in network-listening components in some versions of ArubaOS. An attacker with the ability to transmit specially-crafted IP traffic to a mobility controller could exploit this vulnerability and cause a process crash or to execute arbitrary code within the underlying operating system with full system privileges. Such an attack could lead to complete system compromise. The ability to transmit traffic to an IP interface on the mobility controller is required to carry out an attack. The attack leverages the PAPI protocol (UDP port 8211). If the mobility controller is only bridging L2 traffic to an uplink and does not have an IP address that is accessible to the attacker, it cannot be attacked.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
ArubaOS | <6.4.4.21 | |
ArubaOS | >=6.5.0.0<6.5.4.13 | |
ArubaOS | >=8.0.0.0<8.2.2.6 | |
ArubaOS | >=8.3.0.0<8.3.0.7 | |
ArubaOS | >=8.4.0.0<8.4.0.3 | |
ArubaOS | >=8.4.0.4<8.5.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-7081 is classified as a high severity remote code execution vulnerability.
To fix CVE-2018-7081, upgrade ArubaOS to a version later than 6.4.4.21, 6.5.4.13, 8.2.2.6, 8.3.0.7, 8.4.0.3, or 8.5.0.0.
Exploitation of CVE-2018-7081 can lead to a process crash or arbitrary code execution on the affected ArubaOS devices.
CVE-2018-7081 affects multiple versions of ArubaOS including those up to 6.4.4.21 and between 6.5.0.0 and 8.5.0.0.
Organizations using the specified vulnerable versions of ArubaOS in network-listening components are at risk from CVE-2018-7081.