By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: HPE warns of critical RCE flaws in Aruba Networking access points
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > HPE warns of critical RCE flaws in Aruba Networking access points
Tech News

HPE warns of critical RCE flaws in Aruba Networking access points

By admin 3 Min Read
Share
SHARE

Hewlett Packard Enterprise (HPE) released updates for Instant AOS-8 and AOS-10 software to address two critical vulnerabilities in Aruba Networking Access Points.

The two security issues could allow a remote attacker to perform unauthenticated command injection by sending specially crafted packets to Aruba’s Access Point management protocol (PAPI) over UDP port 8211.

The critical flaws are tracked as CVE-2024-42509 and CVE-2024-47460, and have been assessed with a severity score of 9.8 and 9.0, respectively. Both are in the command line interface (CLI) service, which is accessed via the PAPI protocol.

The update also fixes another four security vulnerabilities:

  • CVE-2024-47461 (7.2 severity score): authenticated remote command execution that could allow an attacker to execute arbitrary commands on the underlying operating system
  • CVE-2024-47462 and CVE-2024-47463 (7.2 severity score): an authenticated attacker could create arbitrary files, potentially leading to remote command execution
  • CVE-2024-47464 (6.8 severity score): an authenticated attacker exploiting it could access unauthorized files via path traversal

All six vulnerabilities impact AOS-10.4.x.x: 10.4.1.4 and older releases, Instant AOS-8.12.x.x: 8.12.0.2 and below, and Instant AOS-8.10.x.x: 8.10.0.13 and older versions.

HPE notes in the security advisory that several more versions of the software that have reached their End of Maintenance dates are also impacted by these flaws there will be no security updates for them.

Fixes and workarounds

To address vulnerabilities in Aruba Networking Access Points, HPE recommends users to update their devices to the following software versions or newer:

  • AOS-10.7.x.x: Update to version 10.7.0.0 and later.
  • AOS-10.4.x.x: Update to version 10.4.1.5 or later.
  • Instant AOS-8.12.x.x: Update to version 8.12.0.3 or newer.
  • Instant AOS-8.10.x.x: Update to version 8.10.0.14 or above

HPE has also provided workarounds for all six flaws to help in cases where software updates cannot be immediately installed:

For the two critical flaws, the proposed workaround is to restrict/block access to the UDP port 8211 from all untrusted networks.

For the rest of the issues, the vendor recommends restricting access to the CLI and web-based management interfaces by placing them on a dedicated layer 2 segment or VLAN, and to control access with firewall policies at layer 3 and above, which would limit potential exposure.

No active exploitation of the flaws has been observed, but applying the security updates and/or mitigations comes as a strong recommendation.

You Might Also Like

Best Fitness Tracker 2026: Fitbits, Bands & Hybrids

Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That

Critical Fortinet Forticlient EMS flaw now exploited in attacks

21 organisations currently adding to their engineering teams

M5 Ultra Mac Studio Leaks: 8K Video and GPU Benchmarks

TAGGED: Aruba, Command Injection, Hewlett Packard Enterprise, HPE, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article Polymarket under scrutiny in France after trader made $50M on Trump’s win
Next Article Ex OpenAI Employee Finally Tells Us Why He Left
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked
Gaming News
Brush up: How to plan a creative holiday in Europe
Travel
Best Fitness Tracker 2026: Fitbits, Bands & Hybrids
Tech News
Your Photos Are Probably Giving Away Your Location. Here’s How to Stop That
Tech News
Critical Fortinet Forticlient EMS flaw now exploited in attacks
Tech News
Is it time Premier League Darts introduced a reserve player for withdrawals?
Sports
Jefferies screams buy on HDFC Bank, says valuation attractive after 25% dip
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Dimension 20 Is Finally Doing A Vampire: The Masquerade Campaign And I Am So Stoked
March 30, 2026
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?