#1 Middle East & Africa Trusted Cybersecurity News & Magazine |

34 C
Dubai
Tuesday, July 1, 2025
HomeTopics 4PatchUrgent Update: HPE Issues Critical Security Patches for Multiple Aruba Access Point...

Urgent Update: HPE Issues Critical Security Patches for Multiple Aruba Access Point Vulnerabilities

Date:

Related stories

Google Urgently Patches CVE‑2025‑6554 Zero‑Day in Chrome 138 Stable Update

On 26 June 2025, Google rapidly deployed a Stable Channel update...

French Police Arrest Five Key Operators Behind BreachForums Data-Theft Platform

On 25 June 2025, France’s specialist cybercrime unit (BL2C) detained five...

Cybercriminals Weaponized Open-Source Tools in Sustained Campaign Against Africa’s Financial Sector

Since mid-2023, a cybercriminal cluster dubbed CL‑CRI‑1014 has been...

Critical TeamViewer Remote Management Flaw Allows SYSTEM‑Level File Deletion

A high‑severity vulnerability, CVE‑2025‑36537, has been identified in TeamViewer...
spot_imgspot_imgspot_imgspot_img

In a recent security advisory, Hewlett Packard Enterprise (HPE) has issued critical patches for several vulnerabilities affecting Aruba Networking Access Points running Instant AOS-8 and AOS-10. The vulnerabilities, rated as high and critical severity, could allow attackers to gain unauthorized access, execute arbitrary commands with root privileges, and even take full control of compromised devices. These vulnerabilities impact a range of Aruba Access Point models, and HPE urges immediate action to mitigate potential security risks.

This article examines the vulnerabilities, the potential security impacts, and provides essential best practices for securing these critical network devices.

Overview of the Aruba Access Point Vulnerabilities

HPE Aruba Networking has identified multiple vulnerabilities across Aruba Access Points using AOS-8 and AOS-10, with the following assigned CVE identifiers:

  1. CVE-2024-42509: An unauthenticated command injection vulnerability in the CLI service accessed via the PAPI protocol. This flaw could allow attackers to execute arbitrary commands with root privileges, posing a high risk for system compromise.
  2. CVE-2024-47460: Another command injection vulnerability targeting the CLI, accessible through crafted packets sent to UDP port 8211, which can also lead to remote code execution.
  3. CVE-2024-47461: Authenticated remote command execution vulnerability in the CLI that allows attackers with valid credentials to execute arbitrary commands.
  4. CVE-2024-47462 and CVE-2024-47463: Authenticated arbitrary file creation vulnerabilities in the CLI that could lead to remote code execution.
  5. CVE-2024-47464: An authenticated path traversal vulnerability that could allow attackers unauthorized access to sensitive files.

Impacted Products and Versions

The vulnerabilities affect Aruba Access Points running the following versions:

  • AOS-10.4.x.x (10.4.1.4 and below)
  • Instant AOS-8.12.x.x (8.12.0.2 and below)
  • Instant AOS-8.10.x.x (8.10.0.13 and below)

Devices not affected by these vulnerabilities include HPE Aruba Networking Mobility Conductor, Mobility Controllers, SD-WAN Gateways, and the InstantOn Access Points series.

No Available Workarounds for Certain Devices

For affected devices running AOS-10, HPE has confirmed that no workarounds exist, making immediate patching the only viable mitigation. For AOS-8 devices, HPE recommends enabling cluster security via the cluster-security command, though patching remains the preferred solution. It is essential to limit access to the vulnerable UDP port (8211) to trusted networks only, especially if using AOS-10, where no command-based workaround is available.

10 Essential Tips to Prevent Network Vulnerabilities

  1. Apply Security Patches Promptly: Regularly check for and apply firmware updates for Aruba devices. Ensure that the latest patch versions are installed to mitigate these critical vulnerabilities.
  2. Limit Access to Management Interfaces: Restrict CLI and web-based management interfaces to secure VLANs and specific IP ranges to prevent unauthorized access.
  3. Monitor UDP Port 8211 Traffic: Since the PAPI protocol uses this port, configure firewalls to restrict access from untrusted networks.
  4. Enable Cluster Security: For AOS-8 devices, enable cluster security to prevent unauthorized command injection attacks.
  5. Implement Network Segmentation: Place critical infrastructure devices in segmented networks that only trusted devices and users can access.
  6. Regular Vulnerability Assessments: Conduct regular vulnerability scans on access points to detect any residual risks and misconfigurations that may allow unauthorized access.
  7. Deploy Endpoint Security Solutions: Use endpoint security tools to monitor and respond to suspicious activities on access points and network-connected devices.
  8. Enable Strong Authentication: Apply multi-factor authentication (MFA) for accessing management interfaces to protect against unauthorized access.
  9. Restrict File Upload Permissions: Configure permissions carefully to limit file uploads and prevent unauthorized file creation on devices.
  10. Educate and Train Staff: Ensure IT staff are aware of the latest vulnerabilities and follow best practices for device management and configuration.

Conclusion

The recent security patches issued by HPE for Aruba Networking Access Points underscore the ongoing importance of proactive cybersecurity practices in network management. For organizations using Aruba access points in critical environments, the identified vulnerabilities highlight the risks of delayed patching. Applying these patches immediately and following best practices will significantly reduce the threat of unauthorized access and ensure a secure networking environment.

For additional information and access to software updates, visit HPE’s official security advisory here.

Want to stay on top of cybersecurity news? Follow us on Facebook, X (Twitter), Instagram, and LinkedIn for the latest threats, insights, and updates!

Ouaissou DEMBELE
Ouaissou DEMBELEhttp://cybercory.com
Ouaissou DEMBELE is a seasoned cybersecurity expert with over 12 years of experience, specializing in purple teaming, governance, risk management, and compliance (GRC). He currently serves as Co-founder & Group CEO of Sainttly Group, a UAE-based conglomerate comprising Saintynet Cybersecurity, Cybercory.com, and CISO Paradise. At Saintynet, where he also acts as General Manager, Ouaissou leads the company’s cybersecurity vision—developing long-term strategies, ensuring regulatory compliance, and guiding clients in identifying and mitigating evolving threats. As CEO, his mission is to empower organizations with resilient, future-ready cybersecurity frameworks while driving innovation, trust, and strategic value across Sainttly Group’s divisions. Before founding Saintynet, Ouaissou held various consulting roles across the MEA region, collaborating with global organizations on security architecture, operations, and compliance programs. He is also an experienced speaker and trainer, frequently sharing his insights at industry conferences and professional events. Ouaissou holds and teaches multiple certifications, including CCNP Security, CEH, CISSP, CISM, CCSP, Security+, ITILv4, PMP, and ISO 27001, in addition to a Master’s Diploma in Network Security (2013). Through his deep expertise and leadership, Ouaissou plays a pivotal role at Cybercory.com as Editor-in-Chief, and remains a trusted advisor to organizations seeking to elevate their cybersecurity posture and resilience in an increasingly complex threat landscape.

Subscribe

- Never miss a story with notifications

- Gain full access to our premium content

- Browse free from up to 5 devices at once

Latest stories

spot_imgspot_imgspot_imgspot_img

LEAVE A REPLY

Please enter your comment!
Please enter your name here