CVE-2020-24639

9.8 CRITICAL

📋 TL;DR

CVE-2020-24639 is a critical Java deserialization vulnerability in Airwave Glass that allows remote attackers to execute arbitrary commands. Successful exploitation can lead to complete compromise of the containerized environment and potentially the underlying host operating system. Organizations running Airwave Glass versions before 1.3.3 in containerized deployments are affected.

💻 Affected Systems

Products:
  • Airwave Glass
Versions: All versions before 1.3.3
Operating Systems: Any OS running Airwave Glass in containerized environments
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects containerized deployments of Airwave Glass. Traditional installations are not vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the containerized environment leading to host operating system takeover, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Remote code execution within the container, allowing attackers to steal credentials, modify configurations, and pivot to other systems.

🟢

If Mitigated

Limited impact if proper network segmentation, container security controls, and monitoring are in place to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH - The vulnerability can be exploited remotely without authentication, making internet-facing instances extremely vulnerable.
🏢 Internal Only: HIGH - Even internally, the vulnerability allows unauthenticated exploitation and can lead to lateral movement within the network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability leverages unsafe Java deserialization, which has well-known exploitation patterns and public proof-of-concept code exists.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.3

Vendor Advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-001.txt

Restart Required: Yes

Instructions:

1. Download Airwave Glass version 1.3.3 or later from Aruba support portal. 2. Stop the Airwave Glass service. 3. Deploy the updated container image. 4. Restart the service. 5. Verify the version is 1.3.3 or higher.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Airwave Glass containers from internet and restrict internal network access to only necessary systems.

Container Security Controls

linux

Implement container security solutions that can detect and block Java deserialization attacks.

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to only trusted IP addresses
  • Deploy runtime application self-protection (RASP) or web application firewall (WAF) with Java deserialization protection rules

🔍 How to Verify

Check if Vulnerable:

Check the Airwave Glass version via the web interface or container inspection. If version is below 1.3.3 and running in a container, the system is vulnerable.

Check Version:

docker inspect <container_name> | grep -i version OR check the web interface admin panel

Verify Fix Applied:

Verify the version shows 1.3.3 or higher in the Airwave Glass web interface or via container inspection commands.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Java deserialization errors in application logs
  • Suspicious process creation from Java runtime
  • Unexpected network connections from the container

Network Indicators:

  • HTTP requests containing serialized Java objects to Airwave Glass endpoints
  • Outbound connections from Airwave Glass container to unexpected destinations

SIEM Query:

source="airwave-glass" AND ("deserialization" OR "java.io.ObjectInputStream" OR suspicious_command_execution)

🔗 References

📤 Share & Export