-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 Aruba Product Security Advisory ===============================咨询ID: Aruba - psa -2015-004 CVE: CVE-2015-1388发布日期:2015-03-181标题===== Aruba远程接入点(RAP)命令注入概述======== Aruba已经确定了一个问题与“RAP控制台”功能使用的Aruba接入点操作在远程AP模式。受影响产品================= - ArubaOS- ArubaOS 6.1。ArubaOS 6.2。ArubaOS 6.3.1.15及以上版本- ArubaOS 6.4.2.4及以上版本- ArubaOS 6.3.1.15及以上版本- ArubaOS 6.4.2.4及以上版本- ArubaOS 6.4.2.4及以上版本6.1 x。x,和6.2。X不再被积极开发,默认情况下只针对严重问题生成安全补丁。需要为旧版本提供补丁的客户应联系Aruba技术支持提出请求。详情=======此漏洞允许本地用户以“root”权限级别在RAP的底层操作系统上执行命令。只有在桥接模式或分离隧道模式下配置的RAP才能访问“RAP控制台”。为了保护客户网络,阿鲁巴在最初的建议中没有提供额外的细节。 In accordance with our vulnerability disclosure policy, Aruba will update this advisory in 60 days to provide full details of the vulnerability. Workaround ========== Access to the "RAP console" interface may be disabled through use of a firewall rule. See the ArubaOS User Guide section entitled, "Configuring an ACL to Restrict Local Debug Homepage Access" for details. An example of this ACL follows: ip access-list session logon-control user localip svc-http deny user any permit In the ACL above, the alias "localip" refers to the IP address of the RAP. When applied to user traffic, this ACL would deny local users the ability to establish an HTTP session with the RAP. Vulnerability Metrics ===================== Vulnerability Class: Improper Neutralization of Special Elements used in an OS Command (CWE-78) Severity: Low CVSSv2 Overall Score: 3.0 CVSSv2 Vector: (AV:L/AC:M/Au:S/C:P/I:P/A:N) Discovery ========= This issue was reported to Aruba's TAC by a customer. Obtaining Fixed Software ======================== Aruba customers can obtain software updates on the support website: http://support.arubanetworks.com Aruba Support contacts are as follows: +1-800-WiFiLAN (1-800-943-4526) (toll free from within North America) +1-408-754-1200 (toll call from anywhere in the world) The full contact list is at: //www.nexbus-cng.com/support-services/support-program/contact-support/ e-mail: support(at)arubanetworks.com Please do not contact "sirt(at)arubanetworks.com" for software upgrades. Revision History ================ Revision 1.0 / 2015-Mar-18 / Initial release Aruba SIRT Security Procedures ============================== Complete information on reporting security vulnerabilities in Aruba Networks products, obtaining assistance with security incidents is available at: //www.nexbus-cng.com/support-services/security-bulletins/ For reporting *NEW* Aruba Networks security issues, email can be sent to sirt(at)arubanetworks.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found at: //www.nexbus-cng.com/support-services/security-bulletins/ (c) Copyright 2015 by Aruba Networks, Inc. This advisory may be redistributed freely after the release date given at the top of the text, provided that redistributed copies are complete and unmodified, including all date and version information. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iQEcBAEBCAAGBQJVA398AAoJEJj+CcpFhYbZlG4H/iHP+/sFBH/MDD1LlzbzLrfx O2bt+IXOILXPcEbrMt0b+aGlIOk6WnA9ScB4p6d4hhBC52Fch/2rvgGIFwHxtR0+ euNoI1qowlbajF/kmiXPIE7WS+FhihDry9wIwEFHCgfogPtZIVmuUP0wgaAqk2hp aqjWjqLCcO5hMWvLJjXchzs5WBkUGHQX4Oi9t9AOVRxsp3tj+r9xSy8tyrOEDPVI AO5fTHHgL5E9r8b+1ub7Zd9YiPnk7VVB+iejTot03z2WsH3UVwTpKlf2ZpLoXsXu LNhrS0+DJLSvh8UtOV8OBlI87pxzXiWIZRWDipTahPBOA7gwfWSsxQf3yayZrEc= =VzGR -----END PGP SIGNATURE-----
Baidu