Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:18804
HistoryJan 06, 2008 - 12:00 a.m.

Aruba Mobility Controller User Authentication Vulnerability - Aruba Advisory ID: AID-122207

2008-01-0600:00:00
vulners.com
9

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Aruba Networks Security Advisory

Title: Aruba Mobility Controller User Authentication Vulnerability
Aruba Advisory ID: AID-122207
Revision: 1.0

For Public Release on 12/22/2007

SUMMARY

A user authentication vulnerability was discovered during standard bug
reporting procedures in the Aruba Mobility Controller. This
vulnerability affects customers using versions at or below 2.3.6.15,
2.5.2.11, 2.5.4.25, 2.5.5.7, 3.1.1.3, and 2.4.8.11-FIPS using LDAP
authentication for management and VPN (PAP-L2TP) users.

DETAILS

Aruba Mobility Controllers may use external authentication methods to
authenticate administrative and VPN users. A vulnerability in the
LDAP authentication component may allow unauthorized use of
LDAP-authenticated administrative and PAP-L2TP users. LDAP is not the
default authentication method and must be configured as an
authentication method for users before it will be used. By default,
administrative user accounts and passwords are kept in a local
database which is not vulnerable to this defect. Other VPN
authentication methods supported by the Aruba Mobility Controller are
not vulnerable to this defect.

IMPACT

An attacker with access to the management or VPN interfaces of an
Aruba Mobility Controller and knowledge of an existing account may be
able to access the Aruba Mobility Controller with the access levels of
that account (for administrative users) or access the VPN services
(for VPN users).

CVSS BASE METRIC SCORE: 10

WORKAROUNDS

See Solution below.

SOLUTION

Aruba Networks recommends that all customers apply the appropriate
patche(es) as soon as practical. However, in the event that a patch
cannot immediately be applied, the following steps will help to
mitigate the risk:

      • Do not expose the Mobility Controller administrative interface to
        untrusted networks such as the Internet.
      • Disable LDAP authentication for administrative accounts until such
        time as the patches can be applied.
      • Disable LDAP authentication for VPN users until such time as the
        patches can be applied.
      • Disable anonymous binds in the LDAP server until such time as the
        patches can be applied.

OBTAINING FIXED FIRMWARES

Aruba customers can obtain the firmware on the support website:
http://www.arubanetworks.com/support.

Aruba Support contacts are as follows:

    1-800-WiFiLAN (1-800-943-4526) (toll free from within North
    America)

    +1-408-754-1200 (toll call from anywhere in the world)

    e-mail: support(at)arubanetworks.com

Please, do not contact either "wsirt(at)arubanetworks.com" or
"security(at)arubanetworks.com" for software upgrades.

EXPLOITATION AND PUBLIC ANNOUNCEMENTS

This vulnerability will be announced at

Aruba W.S.I.R.T. Advisory:
http://www.arubanetworks.com/support/wsirt/alerts/aid-122207.asc

SecurityFocus Bugtraq
http://www.securityfocus.com/archive/1

STATUS OF THIS NOTICE: Final

Although Aruba Networks cannot guarantee the accuracy of all
statements in this advisory, all of the facts have been checked to the
best of our ability. Aruba Networks does not anticipate issuing
updated versions of this advisory unless there is some material change
in the facts. Should there be a significant change in the facts, Aruba
Networks may update this advisory.

A stand-alone copy or paraphrase of the text of this security advisory
that omits the distribution URL in the following section is an
uncontrolled copy, and may lack important information or contain
factual errors.

DISTRIBUTION OF THIS ANNOUNCEMENT

This advisory will be posted on Aruba's website at:
http://www.arubanetworks.com/support/alerts/aid-122207.asc

Future updates of this advisory, if any, will be placed on Aruba's
worldwide website, but may or may not be actively announced on mailing
lists or newsgroups. Users concerned about this problem are encouraged
to check the above URL for any updates.

REVISION HISTORY

  Revision 1.0 / 12-22-2007 / Initial release

ARUBA WSIRT SECURITY PROCEDURES

Complete information on reporting security vulnerabilities in Aruba
Wireless Networks products, obtaining assistance with security
incidents is available at
http://www.arubanetworks.com/support/wsirt.php

For reporting NEW Aruba Networks security issues, email can be sent
to wsirt(at)arubanetworks.com or security(at)arubanetworks.com. For
sensitive information we encourage the use of PGP encryption. Our
public keys can be found at
http://www.arubanetworks.com/support/wsirt.php

(c) Copyright 2007 by Aruba Networks, Inc. This advisory may be
redistributed freely after the release date given at the top of the
text, provided that redistributed copies are complete and unmodified,
including all date and version information.

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFHfyZrp6KijA4qefURAmPFAJ9VphNGHopaely5LbikpgkDOGY+kwCg5FLg
I6tWd4xQF/WeABV+rFW2td4=
=nzLU
-----END PGP SIGNATURE-----