MitM attack in Aruba Fabric Composer RADIUS protocol



Risk Medium
Patch available NO
Number of vulnerabilities 1
CVE-ID CVE-2024-3596
CWE-ID CWE-327
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software
Aruba Fabric Composer
Other software / Other software solutions

Vendor Aruba Networks

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Use of a broken or risky cryptographic algorithm

EUVDB-ID: #VU94063

Risk: Medium

CVSSv4.0: 6.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/U:Green]

CVE-ID: CVE-2024-3596

CWE-ID: CWE-327 - Use of a Broken or Risky Cryptographic Algorithm

Exploit availability: Yes

Description

The vulnerability allows a remote attacker to compromise the target system.

The vulnerability exists due to use of a broken or risky cryptographic algorithm in RADIUS Protocol. A remote user can perform a man-in-the-middle (MitM) attack and gain access to target system.

Mitigation

Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vendor is planning to release a patch in November 2024.

Vulnerable software versions

Aruba Fabric Composer: All versions

CPE2.3 External links

https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=hpesbnw04662en_us


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability. However, proof of concept for this vulnerability is available.



###SIDEBAR###