Aruba Mobility Controller User Authentication Vulnerability

2008.01.10
Credit: Robbie Gill
Risk: Medium
Local: Yes
Remote: Yes
CWE: CWE-287


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

Aruba Networks Security Advisory Title: Aruba Mobility Controller User Authentication Vulnerability Aruba Advisory ID: AID-122207 Revision: 1.0 Please see attached PGP signed file for details of the vulnerability. -Robbie --------------------- Robbie Gill Aruba Networks rgill (at) arubanetworks (dot) com [email concealed] ---------------------- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Aruba Networks Security Advisory Title: Aruba Mobility Controller User Authentication Vulnerability Aruba Advisory ID: AID-122207 Revision: 1.0 For Public Release on 12/22/2007 SUMMARY A user authentication vulnerability was discovered during standard bug reporting procedures in the Aruba Mobility Controller. This vulnerability affects customers using versions at or below 2.3.6.15, 2.5.2.11, 2.5.4.25, 2.5.5.7, 3.1.1.3, and 2.4.8.11-FIPS using LDAP authentication for management and VPN (PAP-L2TP) users. DETAILS Aruba Mobility Controllers may use external authentication methods to authenticate administrative and VPN users. A vulnerability in the LDAP authentication component may allow unauthorized use of LDAP-authenticated administrative and PAP-L2TP users. LDAP is not the default authentication method and must be configured as an authentication method for users before it will be used. By default, administrative user accounts and passwords are kept in a local database which is not vulnerable to this defect. Other VPN authentication methods supported by the Aruba Mobility Controller are not vulnerable to this defect. IMPACT An attacker with access to the management or VPN interfaces of an Aruba Mobility Controller and knowledge of an existing account may be able to access the Aruba Mobility Controller with the access levels of that account (for administrative users) or access the VPN services (for VPN users). CVSS BASE METRIC SCORE: 10 WORKAROUNDS See Solution below. SOLUTION Aruba Networks recommends that all customers apply the appropriate patche(es) as soon as practical. However, in the event that a patch cannot immediately be applied, the following steps will help to mitigate the risk: - - - Do not expose the Mobility Controller administrative interface to untrusted networks such as the Internet. - - - Disable LDAP authentication for administrative accounts until such time as the patches can be applied. - - - Disable LDAP authentication for VPN users until such time as the patches can be applied. - - - Disable anonymous binds in the LDAP server until such time as the patches can be applied. OBTAINING FIXED FIRMWARES Aruba customers can obtain the firmware on the support website: http://www.arubanetworks.com/support. Aruba Support contacts are as follows: 1-800-WiFiLAN (1-800-943-4526) (toll free from within North America) +1-408-754-1200 (toll call from anywhere in the world) e-mail: support(at)arubanetworks.com Please, do not contact either "wsirt(at)arubanetworks.com" or "security(at)arubanetworks.com" for software upgrades. EXPLOITATION AND PUBLIC ANNOUNCEMENTS This vulnerability will be announced at Aruba W.S.I.R.T. Advisory: http://www.arubanetworks.com/support/wsirt/alerts/aid-122207.asc SecurityFocus Bugtraq http://www.securityfocus.com/archive/1 STATUS OF THIS NOTICE: Final Although Aruba Networks cannot guarantee the accuracy of all statements in this advisory, all of the facts have been checked to the best of our ability. Aruba Networks does not anticipate issuing updated versions of this advisory unless there is some material change in the facts. Should there be a significant change in the facts, Aruba Networks may update this advisory. A stand-alone copy or paraphrase of the text of this security advisory that omits the distribution URL in the following section is an uncontrolled copy, and may lack important information or contain factual errors. DISTRIBUTION OF THIS ANNOUNCEMENT This advisory will be posted on Aruba's website at: http://www.arubanetworks.com/support/alerts/aid-122207.asc Future updates of this advisory, if any, will be placed on Aruba's worldwide website, but may or may not be actively announced on mailing lists or newsgroups. Users concerned about this problem are encouraged to check the above URL for any updates. REVISION HISTORY Revision 1.0 / 12-22-2007 / Initial release ARUBA WSIRT SECURITY PROCEDURES Complete information on reporting security vulnerabilities in Aruba Wireless Networks products, obtaining assistance with security incidents is available at http://www.arubanetworks.com/support/wsirt.php For reporting *NEW* Aruba Networks security issues, email can be sent to wsirt(at)arubanetworks.com or security(at)arubanetworks.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found at http://www.arubanetworks.com/support/wsirt.php (c) Copyright 2007 by Aruba Networks, Inc. This advisory may be redistributed freely after the release date given at the top of the text, provided that redistributed copies are complete and unmodified, including all date and version information. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFHfyZrp6KijA4qefURAmPFAJ9VphNGHopaely5LbikpgkDOGY+kwCg5FLg I6tWd4xQF/WeABV+rFW2td4= =nzLU -----END PGP SIGNATURE-----


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2023, cxsecurity.com

 

Back to Top