- published 1/21/25 9:03 AM •
- updated 09 January 2025 •
- 3 Min Read
Command Injection Vulnerabilities in HPE Aruba
Alert Rating
Audience
Corporations, Government
On this page
Command Injection Vulnerabilities in HPE Aruba
Vulnerabilities Overview:
- CVE-2024-54006 & CVE-2024-54007
- Severity: Both vulnerabilities are rated as High (CVSS score 7.2).
- Impact: These vulnerabilities allow authenticated attackers with administrative privileges to execute arbitrary commands on the 501 Wireless Client Bridge. Successful exploitation could provide attackers with full control over the device’s underlying operating system.
- Exploitability: Exploitation requires administrative credentials, but the attacker can gain complete control over the device once successfully exploited.
Affected Software Versions:
- 501 Wireless Client Bridge V2.1.1.0-B0030 and below
Fixed Versions:
- V2.x.x.x: V2.1.2.0-B0033 and above
Take Action
Protect yourself
- Immediately upgrade affected devices to fixed version.
- Conduct a thorough security audit of all Aruba devices in your network.
- Monitor for any suspicious activities or unauthorized access attempts.
- Implement strong authentication mechanisms and regularly rotate administrative credentials.
GET INVOLVED
Make a Difference
Other Threats
20 January 2025
Critical Vulnerability in F5 Traffix SDC
A critical vulnerability has been discovered in F5 Traffix SDC, linked to Apache Tomcat, which could allow attackers to gain unauthorized access to compromised systems.
Protecting
Corporations, Government
17 January 2025
NVIDIA has released security updates to address multiple vulnerabilities in the NVIDIA Container Toolkit and NVIDIA GPU Operator.
Protecting
Corporations, Government
16 January 2025
Critical Vulnerability in FortiSwitch Devices
A critical vulnerability (CVE-2023-37936) has been discovered in multiple versions of Fortinet FortiSwitch devices. This vulnerability, classified as a use of hard-coded cryptographic key [CWE-321], allows a remote unauthenticated attacker in possession of the key to execute unauthorized code via crafted cryptographic request.
Protecting
Corporations, Government