CVE-2018-7080:A vulnerability in the firmware of embedded BLE radios in certain Aruba Access Points allows an attacker to install malicious firmware and gain access to the AP's console port, applicable only if the BLE radio is enabled.

splash
Back

Description Preview

CVE-2018-7080 describes a vulnerability that exists in the firmware of embedded Bluetooth Low Energy (BLE) radios present in specific models of Aruba Access Points manufactured by Hewlett Packard Enterprise. If exploited, an attacker could install potentially malicious firmware onto the BLE radio of the affected access points, which could subsequently allow unauthorized access to the access point's console port. It is important to note that this vulnerability is only applicable if the BLE radio feature is enabled, as it is disabled by default in the affected devices. Additionally, Aruba products are not affected by a similar vulnerability identified as CVE-2018-16986.

Overview

  • Affected Products: Aruba Access Points, including AP-3xx and IAP-3xx series, AP-203R, AP-203RP, and various versions of ArubaOS (6.4.4.x prior to 6.4.4.20, 6.5.3.x prior to 6.5.3.9, 6.5.4.x prior to 6.5.4.9, 8.x prior to 8.2.2.2, and 8.3.x prior to 8.3.0.4).
  • Vulnerability Type: Remote access restriction bypass.
  • Impact: An attacker could gain unauthorized access to the access point's console port.
  • Default Configuration: The BLE radio is disabled by default, reducing the risk of exploitation unless explicitly enabled.

Remediation

To mitigate the risk associated with CVE-2018-7080, users of affected Aruba Access Points should:

  1. Update Firmware: Upgrade to the latest version of ArubaOS that addresses this vulnerability. Ensure that the firmware version is at least:
    • ArubaOS 6.4.4.20 or later
    • ArubaOS 6.5.3.9 or later
    • ArubaOS 6.5.4.9 or later
    • ArubaOS 8.2.2.2 or later
    • ArubaOS 8.3.0.4 or later
  2. Disable BLE Radio: If not required, keep the BLE radio feature disabled to prevent potential exploitation.
  3. Monitor Access Points: Regularly check logs and monitor for any unauthorized access attempts.

References

  1. SecurityFocus BID 105814
  2. Aruba Networks Security Alert ARUBA-PSA-2018-006

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Health Care & Social Assistance: Low
    Health Care & Social Assistance
  2. Educational Services: Low
    Educational Services
  3. Manufacturing: Low
    Manufacturing
  4. Public Administration: Low
    Public Administration
  5. Retail Trade: Low
    Retail Trade
  6. Finance and Insurance: Low
    Finance and Insurance
  7. Other Services (except Public Administration): Low
    Other Services (except Public Administration)
  8. Transportation & Warehousing: Low
    Transportation & Warehousing
  9. Accommodation & Food Services: Low
    Accommodation & Food Services
  10. Administrative, Support, Waste Management & Remediation Services: Low
    Administrative, Support, Waste Management & Remediation Services
  11. Agriculture, Forestry Fishing & Hunting: Low
    Agriculture, Forestry Fishing & Hunting
  12. Arts, Entertainment & Recreation: Low
    Arts, Entertainment & Recreation
  13. Construction: Low
    Construction
  14. Information: Low
    Information
  15. Management of Companies & Enterprises: Low
    Management of Companies & Enterprises
  16. Mining: Low
    Mining
  17. Professional, Scientific, & Technical Services: Low
    Professional, Scientific, & Technical Services
  18. Real Estate Rental & Leasing: Low
    Real Estate Rental & Leasing
  19. Utilities: Low
    Utilities
  20. Wholesale Trade: Low
    Wholesale Trade

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background