Cybersecurity researchers have detailed as many as 5 extreme safety flaws within the implementation of TLS protocol in a number of fashions of Aruba and Avaya community switches that may very well be abused to achieve distant entry to enterprise networks and steal worthwhile info.
The findings observe the March disclosure of TLStorm, a set of three crucial flaws in APC Smart-UPS units that would allow an attacker to take over management and, worse, bodily injury the home equipment.
IoT safety agency Armis, which uncovered the shortcomings, famous that the design flaws might be traced again to a standard supply: a misuse of NanoSSL, a standards-based SSL developer suite from Mocana, a DigiCert subsidiary.
The new set of flaws, dubbed TLStorm 2.0, renders Aruba and Avaya community switches susceptible to distant code execution vulnerabilities, enabling an adversary to commandeer the units, transfer laterally throughout the community, and exfiltrate delicate data.
Affected units embrace Avaya ERS3500 Series, ERS3600 Series, ERS4900 Series, and ERS5900 Series in addition to Aruba 5400R Series, 3810 Series, 2920 Series, 2930F Series, 2930M Series, 2530 Series, and 2540 Series.
Armis chalked up the issues to an “edge case,” a failure to stick to tips pertaining to the NanoSSL library that would end in distant code execution. The record of distant code execution bugs is as follows –
- CVE-2022-23676 (CVSS rating: 9.1) – Two reminiscence corruption vulnerabilities within the RADIUS consumer implementation of Aruba switches
- CVE-2022-23677 (CVSS rating: 9.0) – NanoSSL misuse on a number of interfaces in Aruba switches
- CVE-2022-29860 (CVSS rating: 9.8) – TLS reassembly heap overflow vulnerability in Avaya switches
- CVE-2022-29861 (CVSS rating: 9.8) – HTTP header parsing stack overflow vulnerability in Avaya switches
- HTTP POST request dealing with heap overflow vulnerability in a discontinued Avaya product line (no CVE)
“These research findings are significant as they highlight that the network infrastructure itself is at risk and exploitable by attackers, meaning that network segmentation alone is no longer sufficient as a security measure,” Barak Hadad, head of analysis in engineering at Armis, stated.
Organizations deploying impacted Avaya and Aruba units are extremely really useful to use the patches to mitigate any potential exploit makes an attempt.