Share This:

Cybersecurity Threat Advisory

HPE Aruba Networking has disclosed that critical remote code execution (RCE) vulnerabilities are impacting multiple versions of ArubaOS. Out of the ten vulnerabilities found, four pose critical risks of unauthenticated buffer overflows in various services. Read this Cybersecurity Threat Advisory in full to learn the recommendations to protect against these vulnerabilities.

What is the threat?

The four critical vulnerabilities that have been identified are:

  • CVE-2024-26305: This vulnerability resides in the ArubaOS Utility daemon. When a malicious packet is sent to the PAPI (Aruba’s access point management protocol) UDP port 8211, it can trigger a buffer overflow, allowing attackers to inject and execute arbitrary code on the device.
  • CVE-2024-26304: This vulnerability is affects L2/L3 management service that can allow remote code execution.
  • CVE-2024-33511: This is a buffer overflow vulnerability in the underlying Automatic Reporting service that can allow remote code execution.
  • CVE-2024-33512: This is a buffer overflow vulnerability in the underlying Local User Authentication Database service.

CVE-2024-26304, CVE-2024-33511, and CVE-2024-33512 are all exploitable through sending specially crafted packets to the PAPI UDP port 8211.

Why is it noteworthy?

Successful exploitation of the above vulnerabilities allows unauthenticated remote code execution (RCE) with privileged access on the underlying operating system. This means attackers can take complete control of the device and can potentially travel laterally.

What is the exposure or risk?

HPE Aruba Networking has not observed any cases of active exploitation or the existence of proof-of-concept (PoC) exploits for the vulnerabilities. However, if exploited, the vulnerabilities can allow an attacker to take complete control of affected devices. They could lead to disrupted network operations, stolen data, or further attacks within the network.

What are the recommendations?

Barracuda MSP recommends the following actions to limit the impact of the critical ArubaOS vulnerabilities:

  • Update to the newest, patched versions as listed below:
    • ArubaOS and above
    • ArubaOS and above
    • ArubaOS and above
    • ArubaOS and above
    • ArubaOS and above
  • Enable the Enhanced PAPI Security feature using a non-default key as a temporary workaround for ArubaOS 8.x.


For more in-depth information about the recommendations, please visit the following links:

If you have any questions about this Cybersecurity Threat Advisory, please contact Barracuda XDR’s Security Operations Center.

Share This:
Stacey Landrum

Posted by Stacey Landrum

Leave a reply

Your email address will not be published. Required fields are marked *