CVE-2020-24641

7.5 HIGH

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in Aruba AirWave Glass versions before 1.3.3. Attackers can exploit an unauthenticated endpoint to access internal systems, potentially leading to authentication bypass and administrative access to the web interface. Organizations running vulnerable versions of Aruba AirWave Glass are affected.

💻 Affected Systems

Products:
  • Aruba AirWave Glass
Versions: All versions before 1.3.3
Operating Systems: Not OS-specific
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the web administrative interface component of AirWave Glass deployments.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full administrative compromise of the AirWave Glass system, allowing attackers to control the administrative interface, access sensitive network data, and potentially pivot to other internal systems.

🟠

Likely Case

Unauthenticated attackers gain access to internal services and sensitive information, leading to authentication bypass and limited administrative access.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the AirWave Glass system itself without lateral movement.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires no authentication and leverages a known SSRF pattern against a specific endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.3

Vendor Advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-001.txt

Restart Required: Yes

Instructions:

1. Download AirWave Glass version 1.3.3 or later from Aruba support portal. 2. Backup current configuration. 3. Apply the update following Aruba's upgrade documentation. 4. Restart the AirWave Glass service.

🔧 Temporary Workarounds

Network Access Control

all

Restrict network access to the AirWave Glass administrative interface using firewall rules.

Authentication Enforcement

all

Implement additional authentication layers or IP whitelisting for administrative access.

🧯 If You Can't Patch

  • Isolate the AirWave Glass system in a dedicated network segment with strict firewall rules
  • Implement web application firewall (WAF) rules to block SSRF patterns and unauthenticated requests to sensitive endpoints

🔍 How to Verify

Check if Vulnerable:

Check the AirWave Glass version in the administrative interface or via system logs. Versions before 1.3.3 are vulnerable.

Check Version:

Check the web interface or system logs for version information (specific command varies by deployment)

Verify Fix Applied:

Verify the version shows 1.3.3 or later in the administrative interface and test that the SSRF endpoint no longer accepts malicious requests.

📡 Detection & Monitoring

Log Indicators:

  • Unusual requests to internal endpoints from AirWave Glass
  • Unauthenticated access attempts to administrative functions
  • SSRF pattern requests in web logs

Network Indicators:

  • Unexpected outbound connections from AirWave Glass to internal systems
  • Traffic patterns suggesting internal service scanning

SIEM Query:

source="airwave_glass" AND (uri="*vulnerable_endpoint*" OR status="401" OR status="403")

🔗 References

📤 Share & Export