
====================================================================

                             CERT-Renater

                 Note d'Information No. 2021/VULN154
_____________________________________________________________________

DATE                : 11/03/2021

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running Aruba Instant versions prior to
      8.7.1.2, 8.6.0.8, 8.5.0.12, 8.3.0.15, 6.5.4.19, 6.4.4.8-4.2.4.19.

=====================================================================
https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-007.txt
_____________________________________________________________________

Aruba Product Security Advisory
===============================
Advisory ID: ARUBA-PSA-2021-007
CVE: CVE-2019-5317, CVE-2019-5319, CVE-2020-24635, CVE-2020-24636,
CVE-2021-25143, CVE-2021-25144, CVE-2021-25145, CVE-2021-25146,
CVE-2021-25148, CVE-2021-25149, CVE-2021-25150, CVE-2021-25155,
CVE-2021-25156, CVE-2021-25157, CVE-2021-25158, CVE-2021-25159,
CVE-2021-25160, CVE-2021-25161, CVE-2021-25162

Publication Date: 2021-Mar-09
Status: Confirmed
Severity: Critical
Revision: 1


Title
=====
Aruba Instant (IAP) Multiple Vulnerabilities


Overview
========
Aruba has released patches for Aruba Instant that address multiple
security vulnerabilities.


Affected Products
=================
Aruba Instant Access Points

Affected versions: Not all vulnerabilities in this advisory affect all
Aruba Instant branches. If an Aruba Instant branch is not listed as
affected, it means that any Aruba Instant version in that given branch
is not affected. For example, the 6.4.x.x and 6.5.x.x branches are
not affected by CVE-2021-25143.


Unaffected Products
===================
Aruba Mobility Conductor (formerly Mobility Master), Aruba
Mobility Controllers, Access-Points when managed by Mobility
Controllers and Aruba SD-WAN Gateways are not affected by these
vulnerabilities.  Aruba Instant On is also not affected by these
vulnerabilities.


Details
=======

  Buffer Overflow Vulnerabilities in the PAPI protocol (CVE-2019-5319,
  CVE-2021-25144, CVE-2021-25149)
  ---------------------------------------------------------------------
    There are multiple buffer overflow vulnerabilities that could lead
    to unauthenticated remote code execution by sending especially
    crafted packets destined to the PAPI (Aruba Networks AP management
    protocol) UDP port (8211). Successful exploitation of these
    vulnerabilities results in the ability to execute arbitrary code
    as a privileged user on the underlying operating system.

    Internal references: ATLWL-104, ATLWL-137, ATLWL-160
    Severity: Critical
    CVSSv3 Overall Score: 9.8
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    Discovery: These vulnerabilities were discovered and reported by
    a collaboration between Comcast CyberSecurity / SSC and River Loop
    Security and separately by Erik de Jong (bugcrowd.com/erikdejong)
    via Aruba's Bug Bounty Program.

    Workarounds: Block access to the Aruba Instant device IP address
    on port UDP/8211 from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and below
    - Aruba Instant 6.5.x: 6.5.4.16 and below
    - Aruba Instant 8.3.x: 8.3.0.12 and below
    - Aruba Instant 8.5.x: 8.5.0.6 and below
    - Aruba Instant 8.6.x: 8.6.0.2 and below

    Resolved Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.19 and above
    - Aruba Instant 6.5.x: 6.5.4.17 and above
    - Aruba Instant 8.3.x: 8.3.0.13 and above
    - Aruba Instant 8.5.x: 8.5.0.7 and above
    - Aruba Instant 8.6.x: 8.6.0.3 and above
    - Aruba Instant 8.7.x: 8.7.0.0 and above



  Authenticated Arbitrary Remote Command Execution (CVE-2021-25150)
  ---------------------------------------------------------------------
    An authenticated command injection vulnerability exists in the
    Aruba Instant command line interface. Successful exploitation of
    this vulnerability results in the ability to execute arbitrary
    commands as a privileged user on the underlying operating system.
    This allows an attacker to fully compromise the underlying host
    operating system.

    Internal references: ATLWL-95, ATLWL-114, ATLWL-135
    Severity: High
    CVSSv3 Overall Score: 8.8
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Discovery: This vulnerability was discovered and reported by
    a collaboration between Comcast CyberSecurity / SSC and River Loop
    Security and separately by Daniel Jensen (@dozernz) and Erik de
    Jong (bugcrowd.com/erikdejong) via Aruba's Bug Bounty Program.

    Workaround: Block access to the Aruba Instant Command Line
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.5.x: 6.5.4.17 and below
    - Aruba Instant 8.3.x: 8.3.0.13 and below
    - Aruba Instant 8.5.x: 8.5.0.10 and below
    - Aruba Instant 8.6.x: 8.6.0.4 and below

    Resolved Versions:
    - Aruba Instant 6.5.x: 6.5.4.18 and above
    - Aruba Instant 8.3.x: 8.3.0.14 and above
    - Aruba Instant 8.5.x: 8.5.0.11 and above
    - Aruba Instant 8.6.x: 8.6.0.5 and above
    - Aruba Instant 8.7.x: 8.7.0.0 and above


  Authenticated Arbitrary File Write via CLI (CVE-2021-25148)
  ---------------------------------------------------------------------
    A vulnerability exists that allows an authenticated attacker to
    overwrite an arbitrary file with attacker-controlled content via
    the Command Line Interface. Successful exploitation of this
    vulnerability leads to overwrite of sensitive system files.

    Internal reference: ATLWL-109
    Severity: High
    CVSSv3 Overall Score: 8.8
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

    Discovery: These vulnerabilities were discovered and reported by
    a collaboration between Comcast CyberSecurity / SSC and River Loop
    Security and separately by Erik de Jong (bugcrowd.com/erikdejong)
    via Aruba's Bug Bounty Program

    Workaround: Block access to the Aruba Instant Command Line
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.5.x: 6.5.4.17 and below
    - Aruba Instant 8.3.x: 8.3.0.13 and below
    - Aruba Instant 8.5.x: 8.5.0.10 and below
    - Aruba Instant 8.6.x: 8.6.0.4 and below

    Resolved Versions:
    - Aruba Instant 6.5.x: 6.5.4.18 and above
    - Aruba Instant 8.3.x: 8.3.0.14 and above
    - Aruba Instant 8.5.x: 8.5.0.11 and above
    - Aruba Instant 8.6.x: 8.6.0.5 and above
    - Aruba Instant 8.7.x: 8.7.0.0 and above


  Unauthenticated Command Injection via DHCP Options (CVE-2020-24636)
  ---------------------------------------------------------------------
    There is a command injection vulnerability in affected Aruba
    Instant versions.  This vulnerability can be exploited without
    authentication provided an attacker controls the DHCP server.
    Successful exploitation of this vulnerability results in the
    ability to execute arbitrary commands as a privileged user on the
    underlying operating system.

    Internal references: ATLWL-136
    Severity: High
    CVSSv3 Overall Score: 8.1
    CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

    Discovery: This vulnerability was discovered and reported by
    Daniel Jensen (@dozernz) via Aruba's Bug Bounty Program.

    Workaround: None.

    Affected Versions:
    - Aruba Instant 6.5.x: 6.5.4.17 and below
    - Aruba Instant 8.3.x: 8.3.0.13 and below
    - Aruba Instant 8.5.x: 8.5.0.10 and below
    - Aruba Instant 8.6.x: 8.6.0.5 and below
    - Aruba Instant 8.7.x: 8.7.0.0 and below

    Resolved Versions:
    - Aruba Instant 6.5.x: 6.5.4.18 and above
    - Aruba Instant 8.3.x: 8.3.0.14 and above
    - Aruba Instant 8.5.x: 8.5.0.11 and above
    - Aruba Instant 8.6.x: 8.6.0.6 and above
    - Aruba Instant 8.7.x: 8.7.1.0 and above


  Unauthenticated Denial of Service via PAPI Protocol (CVE-2021-25143)
  ---------------------------------------------------------------------
    An unauthenticated Denial of Service vulnerability exists in
    affected Aruba Instant access points. This vulnerability can be
    exploited through the PAPI protocol and successful exploitation
    results in a system reboot. By repeatedly exploiting the
    vulnerability, an attacker can deny service to legitimate users.

    Internal references: ATLWL-138
    Severity: High
    CVSSv3 Overall Score: 7.5
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

    Discovery: This vulnerability was discovered and reported by
    Comcast and Erik de Jong (bugcrowd.com/erikdejong) via Aruba's
    Bug Bounty Program.

    Workaround: Block access to the Aruba Instant device IP address
    on port UDP/8211 from all untrusted users.

    Affected Versions:
    - Aruba Instant 8.3.x: 8.3.0.12 and below
    - Aruba Instant 8.5.x: 8.5.0.9 and below
    - Aruba Instant 8.6.x: 8.6.0.4 and below

    Resolved Versions:
    - Aruba Instant 8.3.x: 8.3.0.13 and above
    - Aruba Instant 8.5.x: 8.5.0.10 and above
    - Aruba Instant 8.6.x: 8.6.0.5 and above
    - Aruba Instant 8.7.x: 8.7.0.0 and above


  Unauthenticated Command Injection via Web UI (CVE-2021-25162)
  ---------------------------------------------------------------------
    An Unauthenticated Command Injection vulnerability exists within
    the Aruba Instant Web UI.  Successful exploitation results in the
    execution of arbitrary commands on the underlying operating system.
    This vulnerability is only exploitable under very specific,
    non-standard configurations and in most cases would require another
    vulnerability in order to be exploitable.

    Internal reference: ATLWL-193
    Severity: High
    CVSSv3 Overall Score: 7.5
    CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

    Discovery: This vulnerability was discovered  and  reported  by
    Itai Greenhut (@Gr33nh4t) and Gal Zror (@waveburst) from Aleph
    Research (@alephsecurity).

    Workaround: Block access to the Aruba Instant Web Management
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.11 and below
    - Aruba Instant 8.6.x: 8.6.0.7 and below
    - Aruba Instant 8.7.x: 8.7.1.1 and below

    Resolved Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and above
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.8 and above
    - Aruba Instant 8.7.x: 8.7.1.2 and above


  Authenticated Arbitrary File Write via Web UI (CVE-2021-25155)
  ---------------------------------------------------------------------
    A vulnerability exists that allows an authenticated attacker to
    overwrite an arbitrary file with attacker-controlled content via
    the Web UI. Successful exploitation of this vulnerability leads to
    overwrite of sensitive system files.

    Internal reference: ATLWL-186
    Severity: High
    CVSSv3 Overall Score: 7.2
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

    Discovery: This vulnerability was discovered and reported by
    Itai Greenhut (@Gr33nh4t) and Gal Zror (@waveburst) from Aleph
    Research (@alephsecurity).

    Workaround: Block access to the Aruba Instant Web Management
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.11 and below
    - Aruba Instant 8.6.x: 8.6.0.6 and below
    - Aruba Instant 8.7.x: 8.7.1.0 and below

    Resolved Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and above
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.7 and above
    - Aruba Instant 8.7.x: 8.7.1.1 and above


  Authenticated Remote Command Execution (CVE-2020-24635,
  CVE-2021-25146)
  ---------------------------------------------------------------------
    An authenticated command injection vulnerability exists in the
    Aruba Instant command line interface. Successful exploitation of
    these vulnerabilities results in the ability to execute arbitrary
    commands as a privileged user on the underlying operating system.
    This allows an attacker to fully compromise the underlying access
    point operating system.

    Internal references: ATLWL-74, ATLWL-99
    Severity: High
    CVSSv3 Overall Score: 7.2
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

    Discovery: These vulnerabilities were discovered and reported by
    Erik de Jong (bugcrowd.com/erikdejong) via Aruba's Bug Bounty
    Program.

    Workaround: Block access to the Aruba Instant Command Line
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.5.x: 6.5.4.17 and below
    - Aruba Instant 8.3.x: 8.3.0.13 and below
    - Aruba Instant 8.5.x: 8.5.0.10 and below
    - Aruba Instant 8.6.x: 8.6.0.5 and below
    - Aruba Instant 8.7.x: 8.7.0.0 and below

    Resolved Versions:
    - Aruba Instant 6.5.x: 6.5.4.18 and above
    - Aruba Instant 8.3.x: 8.3.0.14 and above
    - Aruba Instant 8.5.x: 8.5.0.11 and above
    - Aruba Instant 8.6.x: 8.6.0.6 and above
    - Aruba Instant 8.7.x: 8.7.1.0 and above


  Authentication Bypass (CVE-2019-5317)
  ---------------------------------------------------------------------
    An attacker with physical access to the affected device can bypass
    authentication mechanisms and thereby gain access to the Aruba
    Instant command line interface. This results in access point
    compromise at the command line interface level.

    Internal references: ATLWL-174
    Severity: Medium
    CVSSv3 Overall Score: 6.8
    CVSS Vector: CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

    Discovery: This vulnerability was discovered and reported by
    Robert Vinson (@GenerousDram).

    Workaround: None.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.19
    - Aruba Instant 6.5.x: 6.5.4.15 and below
    - Aruba Instant 8.3.x: 8.3.0.11 and below
    - Aruba Instant 8.4.x: 8.4.0.5 and below
    - Aruba Instant 8.5.x: 8.5.0.6 and below
    - Aruba Instant 8.6.x: 8.6.0.2 and below

    Resolved Versions:
    - Aruba Instant 6.5.x: 6.5.4.16 and above
    - Aruba Instant 8.3.x: 8.3.0.12 and above
    - Aruba Instant 8.4.x: 8.4.0.6 and above
    - Aruba Instant 8.5.x: 8.5.0.7 and above
    - Aruba Instant 8.6.x: 8.6.0.3 and above
    - Aruba Instant 8.7.x: 8.7.0.0 and above

    Note: The fix for this specific vulnerability has yet not been
    patched in the 6.4.4.8-4.2.4.x branch. This advisory will be
    updated once a fix is made available.


  Authenticated Reflected Cross-Site Scripting (CVE-2021-25161)
  ---------------------------------------------------------------------
    A vulnerability in the web-based management interface of Aruba
    Instant could allow an authenticated remote attacker to conduct a
    reflected cross-site scripting (XSS) attack against a user of the
    interface. A successful exploit could allow an attacker to
    execute arbitrary script code in a victim’s browser in the
    context of the affected interface.

    Internal reference: ATLWL-192
    Severity: Medium
    CVSSv3 Overall Score: 6.1
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

    Discovery: This vulnerability was discovered and reported by
    Itai Greenhut (@Gr33nh4t) and Gal Zror (@waveburst) from Aleph
    Research (@alephsecurity).

    Workaround: Block access to the Aruba Instant Web Management
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.11 and below
    - Aruba Instant 8.6.x: 8.6.0.7 and below
    - Aruba Instant 8.7.x: 8.7.1.1 and below

    Resolved Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and above
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.8 and above
    - Aruba Instant 8.7.x: 8.7.1.2 and above


  Unauthenticated Arbitrary File Read via Race Condition Vulnerability
  (CVE-2021-25158)
  ---------------------------------------------------------------------
    An unauthenticated Arbitrary File Read vulnerability exists in
    affected Aruba Instant hosts.  This vulnerability is the result of
    a race condition in the Web UI.  Successful exploitation of this
    vulnerability results in the ability to read arbitrary files off
    the underlying filesystem, including sensitive system files.

    Internal reference: ATLWL-189
    Severity: Medium
    CVSSv3 Overall Score: 5.9
    CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

    Discovery: This vulnerability was discovered and reported by
    Itai Greenhut (@Gr33nh4t) and Gal Zror (@waveburst) from Aleph
    Research (@alephsecurity).

    Workaround: Block access to the Aruba Instant Web Management
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.11 and below
    - Aruba Instant 8.6.x: 8.6.0.7 and below
    - Aruba Instant 8.7.x: 8.7.1.1 and below

    Resolved Versions:
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.8 and above
    - Aruba Instant 8.7.x: 8.7.1.2 and above


  Authenticated Arbitrary Directory Create via Web UI (CVE-2021-25156)
  ---------------------------------------------------------------------
    An Authenticated Arbitrary Directory Creation vulnerability exists
    in affected Aruba Instant hosts. Successful exploitation of this
    vulnerability will result in a directory being created with the
    directory name controlled by the attacker.

    Internal reference: ATLWL-187
    Severity: Medium
    CVSSv3 Overall Score: 4.9
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

    Discovery: This vulnerability was discovered and reported by
    Itai Greenhut (@Gr33nh4t) and Gal Zror (@waveburst) from Aleph
    Research (@alephsecurity).

    Workaround: Block access to the Aruba Instant Web Management
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.11 and below
    - Aruba Instant 8.6.x: 8.6.0.6 and below
    - Aruba Instant 8.7.x: 8.7.1.0 and below

    Resolved Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and above
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.7 and above
    - Aruba Instant 8.7.x: 8.7.1.1 and above


  Authenticated Arbitrary File Read via Web UI (CVE-2021-25157)
  ---------------------------------------------------------------------
    An Authenticated Arbitrary File Read vulnerability exists in
    affected Aruba Instant hosts.  Successful exploitation of this
    vulnerability results in an attacker being able to read any file
    off the underlying filesystem, including sensitive system files.

    Internal reference: ATLWL-188
    Severity: Medium
    CVSSv3 Overall Score: 4.9
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N

    Discovery: This vulnerability was discovered and reported by
    Itai Greenhut (@Gr33nh4t) and Gal Zror (@waveburst) from Aleph
    Research (@alephsecurity).

    Workaround: Block access to the Aruba Instant Web Management
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.11 and below
    - Aruba Instant 8.6.x: 8.6.0.6 and below
    - Aruba Instant 8.7.x: 8.7.1.0 and below

    Resolved Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and above
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.7 and above
    - Aruba Instant 8.7.x: 8.7.1.1 and above


  Authenticated Arbitrary File Write via Web UI to Specific Backup File
  (CVE-2021-25160)
  ---------------------------------------------------------------------
    An Authenticated Arbitrary File Write vulnerability exists in the
    Aruba Instant Web UI.  Successful exploitation of this
    vulnerability allows an attacker to write arbitrary contents to a
    single specific backup file. This can result in corruption of the
    backup file.

    Internal reference: ATLWL-191
    Severity: Medium
    CVSSv3 Overall Score: 4.9
    CVSS Vector: CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N

    Discovery: This vulnerability was discovered and reported by
    Itai Greenhut (@Gr33nh4t) and Gal Zror (@waveburst) from Aleph
    Research (@alephsecurity).

    Workaround: Block access to the Aruba Instant Web Management
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.11 and below
    - Aruba Instant 8.6.x: 8.6.0.7 and below
    - Aruba Instant 8.7.x: 8.7.1.1 and below

    Resolved Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and above
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.8 and above
    - Aruba Instant 8.7.x: 8.7.1.2 and above


  Authenticated Arbitrary File Write via Web UI (CVE-2021-25159)
  ---------------------------------------------------------------------
    An Authenticated Arbitrary File Write vulnerability exists in
    affected Aruba Instant versions.  This vulnerability is exploited
    through the Web Interface.  Successful exploitation of this
    vulnerability  allows an authenticated attacker to overwrite
    sensitive system files.

    Internal reference: ATLWL-190
    Severity: Medium
    CVSSv3 Overall Score: 4.4
    CVSS Vector: CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:N

    Discovery: This vulnerability was discovered and reported by
    Itai Greenhut (@Gr33nh4t) and Gal Zror (@waveburst) from Aleph
    Research (@alephsecurity).

    Workaround: Block access to the Aruba Instant Web Management
    Interface from all untrusted users.

    Affected Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.17 and below
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.11 and below
    - Aruba Instant 8.6.x: 8.6.0.7 and below
    - Aruba Instant 8.7.x: 8.7.1.1 and below

    Resolved Versions:
    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.18 and above
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.8 and above
    - Aruba Instant 8.7.x: 8.7.1.2 and above


  Remote Unauthorized Disclosure of Information (CVE-2021-25145)
  ---------------------------------------------------------------------
    An unauthenticated information disclosure vulnerability exists in
    affected Aruba Instant access points. A successful attacker in the
    same wired network can exploit this vulnerability resulting in
    sensitive information disclosure.

    Internal references: ATLWL-184
    Severity: Medium
    CVSSv3 Overall Score: 4.3
    CVSS Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

    Discovery: This vulnerability was discovered and reported by
    Jeffrey Goff of Hewlett Packard Enterprise/Aruba Networks.

    Workaround: None.

    Affected Versions:
    - Aruba Instant 6.5.x: 6.5.4.18 and below
    - Aruba Instant 8.3.x: 8.3.0.14 and below
    - Aruba Instant 8.5.x: 8.5.0.10 and below
    - Aruba Instant 8.6.x: 8.6.0.5 and below
    - Aruba Instant 8.7.x: 8.7.0.0 and below

    Resolved Versions:
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.11 and above
    - Aruba Instant 8.6.x: 8.6.0.6 and above
    - Aruba Instant 8.7.x: 8.7.1.0 and above


Resolution
==========
In order to address the vulnerabilities described above for the
affected release branches, it is recommended to upgrade the software
to the following versions (where applicable):

    - Aruba Instant 6.4.x: 6.4.4.8-4.2.4.19 and above
    - Aruba Instant 6.5.x: 6.5.4.19 and above
    - Aruba Instant 8.3.x: 8.3.0.15 and above
    - Aruba Instant 8.5.x: 8.5.0.12 and above
    - Aruba Instant 8.6.x: 8.6.0.8 and above
    - Aruba Instant 8.7.x: 8.7.1.2 and above


Workaround
==========
Workarounds are listed per vulnerability above.
Contact Aruba TAC for any configuration assistance.


Exploitation and Public Discussion
==================================
Aruba is not aware of any exploitation tools or techniques that
specifically target Aruba products.


Revision History
================
Revision 1 / 2021-Mar-09 / Initial release


Aruba SIRT Security Procedures
==============================
Complete information on reporting  security  vulnerabilities  in  Aruba
Networks products, obtaining  assistance  with  security  incidents  is
available at:

http://www.arubanetworks.com/support-services/security-bulletins/


For reporting *NEW* Aruba Networks security issues, email can  be  sent
to aruba-sirt(at)hpe.com. For sensitive information  we  encourage  the
use of PGP encryption. Our public keys can be found at:

http://www.arubanetworks.com/support-services/security-bulletins/


(c) Copyright 2021 by Aruba, a Hewlett Packard Enterprise company.
This advisory may be redistributed freely after the release date  given
at the top of the text, provided  that  the  redistributed  copies  are
complete and unmodified, including all data and version information.


=========================================================
+ CERT-RENATER       |    tel : 01-53-94-20-44          +
+ 23/25 Rue Daviel   |    fax : 01-53-94-20-41          +
+ 75013 Paris        |    email:cert@support.renater.fr +
=========================================================




