IT Strategy & Insights

Aruba Access Points Security Alert

Introduction

In a significant cybersecurity alert, Hewlett Packard Enterprise (HPE) has disclosed multiple vulnerabilities in its Aruba Access Points, affecting various devices widely used in enterprise networks. One of the most alarming issues involves hardcoded passwords, which could allow unauthorized users to gain privileged access to these wireless devices. As businesses increasingly rely on robust wireless infrastructure, addressing such vulnerabilities promptly is critical to maintaining network integrity and data security.

Overview of the Security Issue

HPE issued a security bulletin concerning several critical vulnerabilities in Aruba’s access point software, with one vulnerability—CVE-2023-20598—highlighting the use of hardcoded credentials. These hardcoded passwords are embedded in the system accounts of Aruba access points running the ArubaOS firmware. If exploited, attackers could use these credentials to log into affected access points and potentially manipulate device configurations or disrupt operations.

Key Vulnerabilities Identified

The detailed advisory outlines multiple CVEs, but among them, the most critical include:

  • CVE-2023-20598: Involves hardcoded credentials that could be used by local authenticated users to escalate privileges.
  • CVE-2023-35706, CVE-2023-35707, CVE-2023-35708: These vulnerabilities allow remote attackers to execute arbitrary commands or cause denial-of-service (DoS) attacks under specific conditions.

These flaws primarily impact Aruba AP firmware versions prior to ArubaOS 10.5.1.0 and Aruba Instant 8.11.1.0. Admins using outdated firmware are encouraged to upgrade immediately.

Devices Affected

This vulnerability impacts a wide range of Aruba access points commonly deployed in enterprise environments, including:

  • Aruba Series 500, 510, 520, 530, and 550
  • Access Points running ArubaOS 10.x or Aruba Instant 8.x

Enterprises using these devices should check their firmware versions and consult the official HPE security advisory to confirm if they’re vulnerable.

What HPE Is Doing

HPE has taken swift action by releasing patched firmware versions that eliminate the hardcoded password issue. The company has also provided mitigation steps for organizations that may be unable to immediately apply patches. HPE recommends:

  • Upgrading to ArubaOS 10.5.1.0 or InstantOS 8.11.1.0
  • Disabling affected services if they are not required
  • Using role-based access control to limit user privileges

Security Best Practices

To reduce the risk of unauthorized access, organizations should implement the following security measures:

  • Regularly update firmware to the latest supported versions.
  • Change default credentials and audit user accounts frequently.
  • Limit access to management interfaces via VPNs or secured networks.
  • Enable logging to monitor for unusual access or configuration changes.

Final Thoughts

With threats to network infrastructure growing more sophisticated, all organizations must remain vigilant in addressing known vulnerabilities. The discovery of hardcoded passwords in Aruba access points serves as a reminder of the importance of proactive device management and regular security assessments. Enterprises using Aruba wireless hardware should prioritize these patches without delay to mitigate potential risks and uphold a strong cybersecurity posture.

Move forward with Keystone IT Connect