Operational Defect Database

BugZero found this defect 347 days ago.

Hewlett Packard Enterprise | hpesbnw04445en_us

HPESBNW04445 rev.6 - Aruba Products Using OpenSSL, Multiple Vulnerabilities

Last update date:

2/27/2024

Affected products:

HPE Aruba Networking Central

HPE Aruba Networking EdgeConnect Software

HPE Aruba Networking Fabric Composer

Aruba 300 Series Campus Access Points

Aruba 303 Series Campus Access Points

Aruba 310 Series Campus Access Points

Aruba 320 Series Campus Access Points

Aruba 330 Series Campus Access Points

Aruba 340 Series Campus Access Points

Aruba 370 Series Access Points

Aruba 501 Wireless Client Bridge Series

Aruba AirWave Management Platform

Affected releases:

No affected releases provided.

Fixed releases:

No fixed releases provided.

Description:

Info

Document ID: hpesbnw04445en_us Version: 6 HPESBNW04445 rev.6 - Aruba Products Using OpenSSL, Multiple Vulnerabilities NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2023-02-15 Last Updated: 2023-06-08 Potential Security Impact: Remote: Denial of Service (DoS), Disclosure of Information Source: Hewlett Packard Enterprise, HPE Product Security Response Team VULNERABILITY SUMMARY Title: Multiple Vulnerabilities in OpenSSL Note: Information originally published in ARUBA-PSA-2023-001 Aruba Product Security Advisory =============================== Advisory ID: ARUBA-PSA-2023-001 CVE: CVE-2022-4304, CVE-2022-4450, CVE-2023-0215, CVE-2023-0286 Publication Date: 2023-Feb-08 Last Update: 2023-Jun-08 Status: Confirmed Severity: High Revision: 6 Overview Multiple vulnerabilities have been disclosed in OpenSSL. The following CVEs affect multiple Aruba products that use the OpenSSL library: https://nvd.nist.gov/vuln/detail/CVE-2022-4304 https://nvd.nist.gov/vuln/detail/CVE-2022-4450 https://nvd.nist.gov/vuln/detail/CVE-2023-0215 https://nvd.nist.gov/vuln/detail/CVE-2023-0286 The following CVEs do not affect any Aruba products: https://nvd.nist.gov/vuln/detail/CVE-2022-4203 https://nvd.nist.gov/vuln/detail/CVE-2023-0216 https://nvd.nist.gov/vuln/detail/CVE-2023-0217 https://nvd.nist.gov/vuln/detail/CVE-2023-0401 Affected Products AirWave Management Platform 8.3.0.0 and below including 8.2.x versions Aruba 501 Wireless Client Bridge All versions. No fix is planned. Affects the web-based management interface only. Implement the general workaround listed in this document and protect the web-based management interface from general accessibility. Aruba Analytics and Location Engine 2.2.0.3 and below Aruba Central On-Premises (COP) 2.5.6.x and below Aruba ClearPass Policy Manager Please note that the following versions are only affected by the moderate severity CVEs of CVE-2022-4304, CVE-2023-0215, CVE-2022-4450. Impact to ClearPass is very low. 6.11.2 and below 6.10.8 and below 6.9.13 and below Aruba Fabric Composer (AFC) and Plexxi Composable Fabric Manager (CFM) 6.4.1 and below ArubaOS-CX Switches 10.11.0001 and below 10.10.1060 and below 10.06.0230 and below ArubaOS Wi-Fi Controllers and Gateways ArubaOS SD-WAN Gateways ArubaOS 10.4.x.x: 10.4.0.0 and below ArubaOS 10.3.x.x: 10.3.1.4 and below ArubaOS 8.11.x.x: 8.11.0.1 and below ArubaOS 8.10.x.x: 8.10.0.6 and below ArubaOS 8.7.x.x: 8.7.1.11 and below ArubaOS 8.6.x.x: 8.6.0.20 and below ArubaOS 6.5.x.x: 6.5.4.24 and below SDWAN 2.x.x.x: 8.7.0.0-2.3.0.9 and below Aruba InstantOS / Aruba Access Points running ArubaOS 10 InstantOS 6.5.4.x and 6.4.x.x-4.2.x.x are not affected This product line is only affected if the web-server configuration is changed from default settings to use RSA ciphers. Customers who have configured the use of RSA ciphers will be affected if running the following versions. ArubaOS 10.4.x.x: 10.4.0.0 and below ArubaOS 10.3.x.x: 10.3.1.4 and below Aruba InstantOS 8.11.x.x: 8.11.0.1 and below Aruba InstantOS 8.10.x.x: 8.10.0.6 and below Aruba InstantOS 8.7.x.x: 8.7.1.11 and below Aruba InstantOS 8.6.x.x: 8.6.0.20 and below Aruba EdgeConnect Enterprise ECOS 9.2.3.0 and below ECOS 9.1.5.0 and below ECOS 9.0.8.0 and below ECOS 8.3.8.0 and below ECOS Release 8.3.x are affected and are out of maintenance. Aruba EdgeConnect Enterprise Orchestrator (on prem) Aruba EdgeConnect Enterprise Orchestrator-as-a-Service Aruba EdgeConnect Enterprise Orchestrator-SP Aruba EdgeConnect Enterprise Orchestrator Global Enterprise All existing Orchestrator instances are affected regardless of release Unaffected Products Aruba Central ArubaOS-S Switches Aruba VIA Client Aruba Instant On Aruba NetEdit Aruba User Experience Insight (UXI) Other Aruba products not listed above are also not known to be affected by these vulnerabilities. Details Vulnerabilities have been identified in the OpenSSL library a commonly used software component in multiple Aruba products. These vulnerabilities allow attackers to abuse the functionality provided by OpenSSL to potentially cause denial of service conditions and/or disclosure of sensitive information. For the original advisory please see: https://www.openssl.org/news/secadv/20230207.txt Further details can be found at: https://nvd.nist.gov/vuln/detail/CVE-2022-4304 https://nvd.nist.gov/vuln/detail/CVE-2022-4450 https://nvd.nist.gov/vuln/detail/CVE-2023-0215 https://nvd.nist.gov/vuln/detail/CVE-2023-0286 Internal references: ASIRT-1241, ASIRT-1242, ASIRT-1243, ASIRT-1244, ASIRT-1248 Aruba Threat Labs analyzed these vulnerabilities with the information that has been published by The OpenSSL Project. As of the writing of this advisory there is no public exploit code available. Aruba products have been listed as affected based on the OpenSSL library version being used and the reachability of affected code pathways in each product. See the Workaround section for additional information on how to minimize the risk of these vulnerabilities. Workaround To minimize the likelihood of an attacker exploiting these vulnerabilities, Aruba recommends that web-based management interfaces be restricted to a dedicated layer 2 segment/VLAN and/or controlled by firewall policies at layer 3 and above. Exploitation and Public Discussion These vulnerabilities are being widely discussed in public. Aruba is not aware of any exploitation tools or techniques that specifically target Aruba products. References: CVE-2022-4304 CVE-2022-4450 CVE-2023-0215 CVE-2023-0286 SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Aruba AirWave Management Platform - See vulnerability summary for affected versions Aruba EdgeConnect Enterprise Software - See vulnerability summary for affected versions ArubaOS SD-WAN Gateways - See vulnerability summary for affected versions ArubaOS Wi-Fi Controllers and Gateways - See vulnerability summary for affected versions Aruba Fabric Composer - See vulnerability summary for affected versions Aruba ClearPass Policy Manager - See vulnerability summary for affected versions Aruba Central On-Premises - See vulnerability summary for affected versions Aruba Analytics and Location Engine - See vulnerability summary for affected versions Aruba 300 Series Access Points - See vulnerability summary for affected versions Aruba 303 Series Access Points - See vulnerability summary for affected versions Aruba 310 Series Access Points - See vulnerability summary for affected versions Aruba 320 Series Access Points - See vulnerability summary for affected versions Aruba 330 Series Access Points - See vulnerability summary for affected versions Aruba 340 Series Access Points - See vulnerability summary for affected versions Aruba 370 Series Access Points - See vulnerability summary for affected versions Aruba 500 Series Access Points - See vulnerability summary for affected versions Aruba 510 Series Access Points - See vulnerability summary for affected versions Aruba 530 Series Access Points - See vulnerability summary for affected versions Aruba 550 Series Access Points - See vulnerability summary for affected versions Aruba 630 Series Access Points - See vulnerability summary for affected versions Aruba 650 Series Access Points - See vulnerability summary for affected versions Aruba CX 4100i Switch Series - See vulnerability summary for affected versions Aruba CX 6000 Switch Series - See vulnerability summary for affected versions Aruba CX 6100 Switch Series - See vulnerability summary for affected versions Aruba CX 6200F Switch Series - See vulnerability summary for affected versions Aruba CX 6300 Switch Series - See vulnerability summary for affected versions Aruba CX 6400 Switch Series - See vulnerability summary for affected versions Aruba CX 8320 Switch Series - See vulnerability summary for affected versions Aruba CX 8325 Switch Series - See vulnerability summary for affected versions Aruba CX 8360 Switch Series - See vulnerability summary for affected versions Aruba CX 8400 Switch Series - See vulnerability summary for affected versions Aruba CX 10000 Switch Series - See vulnerability summary for affected versions Aruba CX 9300 Switch Series - See vulnerability summary for affected versions Aruba 501 Client Bridge - See vulnerability summary for affected versions BACKGROUND HPE calculates CVSS using CVSS Version 3.1. If the score is provided from NIST, we will display Version 2.0, 3.0, or 3.1 as provided from NVD. Reference V3 Vector V3 Base Score V2 Vector V2 Base Score CVE-2022-4304 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N 5.9 (AV:N/AC:H/Au:N/C:N/I:C/A:N) 5.4 CVE-2022-4450 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 7.5 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2023-0215 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H 7.5 (AV:N/AC:L/Au:N/C:N/I:N/A:C) 7.8 CVE-2023-0286 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H 7.4 (AV:N/AC:H/Au:N/C:C/I:N/A:C) 7.1 Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002 Details can be found at: https://nvd.nist.gov/vuln/detail/CVE-2022-4304 https://nvd.nist.gov/vuln/detail/CVE-2022-4450 https://nvd.nist.gov/vuln/detail/CVE-2023-0215 https://nvd.nist.gov/vuln/detail/CVE-2023-0286 RESOLUTION Aruba have provided updates: AirWave Management Platform 8.3.0.1 and above (Release ETA - early July 2023) Aruba Analytics and Location Engine 2.2.0.4 and above Aruba Central On-Premises (COP) 2.5.7.0 and above (Release ETA - Early Aug 2023) Aruba ClearPass Policy Manager 6.11.3 and above 6.10.8 Hotfix 1 for Security Issues and above 6.9.13 Hotfix 1 for Security Issues and above Aruba Fabric Composer (AFC) and Plexxi Composable Fabric Manager (CFM) 6.4.2 and above ArubaOS-CX Switches 10.11.1010 and above 10.10.1070 and above (Release ETA – Mid June 2023) 10.06.0240 and above ArubaOS Wi-Fi Controllers and Gateways ArubaOS SD-WAN Gateways ArubaOS 10.4.0.x: 10.4.0.1 and above ArubaOS 8.11.x.x: 8.11.1.0 and above ArubaOS 8.10.x.x: 8.10.0.7 and above (Release ETA – Early June 2023) ArubaOS 8.6.x.x: 8.6.0.21 and above Aruba InstantOS / Aruba Access Points running ArubaOS 10 ArubaOS 10.4.0.x: 10.4.0.1 and above Aruba InstantOS 8.11.x.x: 8.11.1.0 and above Aruba InstantOS 8.10.x.x: 8.10.0.7 and above (Release ETA – Early June 2023) Aruba InstantOS 8.6.x.x: 8.6.0.21 and above Aruba EdgeConnect Enterprise ECOS 9.3.0.0 and above ECOS 9.2.4.0 and above ECOS 9.1.6.0 and above ECOS 9.0.9.0 and above Aruba EdgeConnect Enterprise Orchestrator (self-hosted, on prem or cloud IaaS) Self-hosted Orchestrators must have OpenSSL patched either by installing an RPM package or running yum update depending on the deployment model. Upgrading the Orchestrator application does not resolve these vulnerabilities. Customers will find further mitigation information with specific actions published at the following URL https://www.arubanetworks.com/website/techdocs/sdwan-PDFs/docs/advisories/ec_resolution_openssl_cves_latest.pdf Aruba EdgeConnect Enterprise Orchestrator-as-a-Service (OaaS) Aruba EdgeConnect Enterprise Orchestrator Global Enterprise tenant OaaS instances Aruba EdgeConnect Enterprise Orchestrator-SP tenant OaaS instances Need to be upgraded to: Orchestrator 9.3.0 and above Orchestrator 9.2.4 and above Orchestrator 9.1.7 and above This advisory will be updated once the fixed software version information is available. Aruba does not evaluate or patch product versions that have reached their End of Support (EoS) milestone. For more information about Aruba's End of Support policy visit: https://www.arubanetworks.com/support-services/end-of-life/ HISTORY Version:1 (rev.1) - 15 February 2023 Initial release Version:2 (rev.2) - 27 February 2023 Resolution information for AFC, ALE, COP, AOS, InstantOS, AOS-CX and AirWave added. Added URL to original OpenSSL advisory. ClearPass and ArubaOS affected information updated. Version:3 (rev.3) - 20 March 2023 Resolution information for ClearPass, ECOS and Orchestrator. Orchestrator affected information updated. ArubaOS affected information updated. AOS-CX affected information updated. Version:4 (rev.4) - 6 April 2023 Resolution information for ClearPass 6.11 updated Version:5 (rev.5) - 22 May 2023 Affected and Resolution information for AirWave, COP, AOS, AOS-CX, and InstantOS updated Version:6 (rev.6) - 8 June 2023 Resolution information for Airwave updated. Information for Aruba 501 Wireless Client Bridge added. Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web Form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Hewlett Packard Enterprise Product Security Response Policy: https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00100637en_us Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive System management and security procedures must be reviewed frequently to maintain system integrity. HPE is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HPE is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HPE products the important security information contained in this Bulletin. HPE recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HPE does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HPE will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HPE disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." ©Copyright 2024 Hewlett Packard Enterprise Development LP Hewlett Packard Enterprise Development shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HPE nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise Development and the names of Hewlett Packard Enterprise Development products referenced herein are trademarks of Hewlett Packard Enterprise Development in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.

Scope

None

Resolution

Aruba have provided updates: AirWave Management Platform 8.3.0.1 and above (Release ETA - early July 2023) Aruba Analytics and Location Engine 2.2.0.4 and above Aruba Central On-Premises (COP) 2.5.7.0 and above (Release ETA - Early Aug 2023) Aruba ClearPass Policy Manager 6.11.3 and above 6.10.8 Hotfix 1 for Security Issues and above 6.9.13 Hotfix 1 for Security Issues and above Aruba Fabric Composer (AFC) and Plexxi Composable Fabric Manager (CFM) 6.4.2 and above ArubaOS-CX Switches 10.11.1010 and above 10.10.1070 and above (Release ETA – Mid June 2023) 10.06.0240 and above ArubaOS Wi-Fi Controllers and Gateways ArubaOS SD-WAN Gateways ArubaOS 10.4.0.x: 10.4.0.1 and above ArubaOS 8.11.x.x: 8.11.1.0 and above ArubaOS 8.10.x.x: 8.10.0.7 and above (Release ETA – Early June 2023) ArubaOS 8.6.x.x: 8.6.0.21 and above Aruba InstantOS / Aruba Access Points running ArubaOS 10 ArubaOS 10.4.0.x: 10.4.0.1 and above Aruba InstantOS 8.11.x.x: 8.11.1.0 and above Aruba InstantOS 8.10.x.x: 8.10.0.7 and above (Release ETA – Early June 2023) Aruba InstantOS 8.6.x.x: 8.6.0.21 and above Aruba EdgeConnect Enterprise ECOS 9.3.0.0 and above ECOS 9.2.4.0 and above ECOS 9.1.6.0 and above ECOS 9.0.9.0 and above Aruba EdgeConnect Enterprise Orchestrator (self-hosted, on prem or cloud IaaS) Self-hosted Orchestrators must have OpenSSL patched either by installing an RPM package or running yum update depending on the deployment model. Upgrading the Orchestrator application does not resolve these vulnerabilities. Customers will find further mitigation information with specific actions published at the following URL https://www.arubanetworks.com/website/techdocs/sdwan-PDFs/docs/advisories/ec_resolution_openssl_cves_latest.pdf Aruba EdgeConnect Enterprise Orchestrator-as-a-Service (OaaS) Aruba EdgeConnect Enterprise Orchestrator Global Enterprise tenant OaaS instances Aruba EdgeConnect Enterprise Orchestrator-SP tenant OaaS instances Need to be upgraded to: Orchestrator 9.3.0 and above Orchestrator 9.2.4 and above Orchestrator 9.1.7 and above This advisory will be updated once the fixed software version information is available. Aruba does not evaluate or patch product versions that have reached their End of Support (EoS) milestone. For more information about Aruba's End of Support policy visit: https://www.arubanetworks.com/support-services/end-of-life/ HISTORY Version:1 (rev.1) - 15 February 2023 Initial release Version:2 (rev.2) - 27 February 2023 Resolution information for AFC, ALE, COP, AOS, InstantOS, AOS-CX and AirWave added. Added URL to original OpenSSL advisory. ClearPass and ArubaOS affected information updated. Version:3 (rev.3) - 20 March 2023 Resolution information for ClearPass, ECOS and Orchestrator. Orchestrator affected information updated. ArubaOS affected information updated. AOS-CX affected information updated. Version:4 (rev.4) - 6 April 2023 Resolution information for ClearPass 6.11 updated Version:5 (rev.5) - 22 May 2023 Affected and Resolution information for AirWave, COP, AOS, AOS-CX, and InstantOS updated Version:6 (rev.6) - 8 June 2023 Resolution information for Airwave updated. Information for Aruba 501 Wireless Client Bridge added. Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web Form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Hewlett Packard Enterprise Product Security Response Policy: https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00100637en_us Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive

Additional Resources / Links

Share:

BugZero® Risk Score

What's this?

Coming soon

Status

Unavailable

Learn More

Search:

...