CVE-2017-9000
https://notcve.org/view.php?id=CVE-2017-9000
ArubaOS, all versions prior to 6.3.1.25, 6.4 prior to 6.4.4.16, 6.5.x prior to 6.5.1.9, 6.5.2, 6.5.3 prior to 6.5.3.3, 6.5.4 prior to 6.5.4.2, 8.x prior to 8.1.0.4 FIPS and non-FIPS versions of software are both affected equally is vulnerable to unauthenticated arbitrary file access. An unauthenticated user with network access to an Aruba mobility controller on TCP port 8080 or 8081 may be able to access arbitrary files stored on the mobility controller. Ports 8080 and 8081 are used for captive portal functionality and are listening, by default, on all IP interfaces of the mobility controller, including captive portal interfaces. The attacker could access files which could contain passwords, keys, and other sensitive information that could lead to full system compromise. ArubaOS, en todas las versiones anteriores a la 6.3.1.25, versiones 6.4 anteriores a la 6.4.4.16, versiones 6.5.x anteriores a la 6.5.1.9, 6.5.2, versiones 6.5.3 anteriores a la 6.5.3.3, versiones 6.5.4 anteriores a la 6.5.4.2, versiones 8.x anteriores a la 8.1.0.4 de versiones FIPS y non-FIPS (afectadas por igual), se ha visto afectado por un acceso no autenticado a archivos arbitrarios. • http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-006.txt http://www.securitytracker.com/id/1039580 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2015-1388
https://notcve.org/view.php?id=CVE-2015-1388
The "RAP console" feature in ArubaOS 5.x through 6.2.x, 6.3.x before 6.3.1.15, and 6.4.x before 6.4.2.4 on Aruba access points in Remote Access Point (AP) mode allows remote attackers to execute arbitrary commands via unspecified vectors. La característica 'RAP console' en ArubaOS 5.x hasta 6.2.x, 6.3.x anterior a 6.3.1.15, y 6.4.x anterior a 6.4.2.4 en los puntos de acceso de Aruba en el modo Remote Access Point (AP) permite a atacantes remotos ejecutar comandos arbitrarios a través de vectores no especificados. • http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2015-004.txt • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-2009-3836
https://notcve.org/view.php?id=CVE-2009-3836
ArubaOS 3.3.1.x, 3.3.2.x, RN 3.1.x, 3.4.x, and 3.3.2.x-FIPS on the Aruba Mobility Controller allows remote attackers to cause a denial of service (Access Point crash) via a malformed 802.11 Association Request management frame. ArubaOS v3.3.1.x, v3.3.2.x, RN v3.1.x, v3.4.x y v3.3.2.x-FIPS en "Aruba Mobility Controller" (controlador de movilidad de Aruba) permite a atacantes remotos provocar una denegación de servicio (caída del punto de acceso) a través de "Association Request management frame" (paquetes de gestión de peticiones de asociación) 802.11 malformados. • http://secunia.com/advisories/37085 http://www.arubanetworks.com/support/alerts/aid-102609.asc http://www.securityfocus.com/bid/36832 http://www.vupen.com/english/advisories/2009/3051 •
CVE-2008-7023
https://notcve.org/view.php?id=CVE-2008-7023
Aruba Mobility Controller running ArubaOS 3.3.1.16, and possibly other versions, installs the same default X.509 certificate for all installations, which allows remote attackers to bypass authentication. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation. Aruba Mobility Controller con ArubaOS 3.3.1.16, y posiblemente otras versiones, instala por defecto el mismo certificado X.509 por defecto para todas las instalaciones, lo que permite a atacantes remotos eludir la autenticación. NOTA: esto es sólo una vulnerabilidad cuando el administrador no sigue las recomendaciones de la documentación de seguridad del producto. • http://osvdb.org/51731 http://www.securityfocus.com/archive/1/496604/100/0/threaded http://www.securityfocus.com/archive/1/496622/100/0/threaded http://www.securityfocus.com/bid/31336 • CWE-310: Cryptographic Issues •