CVE-2021-37720
📋 TL;DR
This CVE allows remote attackers to execute arbitrary commands on Aruba SD-WAN and gateway devices running vulnerable ArubaOS versions. Attackers can potentially take full control of affected systems without authentication. Organizations using Aruba SD-WAN software or gateways with unpatched ArubaOS are at risk.
💻 Affected Systems
- Aruba SD-WAN Software
- Aruba Gateways
📦 What is this software?
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Sd Wan by Arubanetworks
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of SD-WAN infrastructure allowing attackers to intercept/modify network traffic, pivot to internal networks, deploy ransomware, or establish persistent backdoors.
Likely Case
Unauthorized access to network devices leading to configuration changes, data exfiltration, or disruption of network services.
If Mitigated
Limited impact with proper network segmentation, but still potential for isolated device compromise.
🎯 Exploit Status
Remote command execution without authentication suggests relatively straightforward exploitation once details are known.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 8.6.0.4-2.2.0.4 or later; 8.7.1.4, 8.6.0.9, 8.5.0.13, 8.3.0.16, 6.5.4.20, 6.4.4.25 or later
Vendor Advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2021-016.txt
Restart Required: Yes
Instructions:
1. Download appropriate patch from Aruba support portal. 2. Backup device configuration. 3. Apply patch following Aruba's upgrade procedures. 4. Reboot device. 5. Verify patch installation and functionality.
🔧 Temporary Workarounds
Network Access Control
allRestrict access to management interfaces using firewall rules or ACLs
# Example ACL to restrict management access
access-list 100 deny ip any any
Management Interface Isolation
allPlace management interfaces on separate VLAN with strict access controls
# Configure management VLAN
vlan 999
name MANAGEMENT
interface vlan 999
ip address 10.0.0.1 255.255.255.0
🧯 If You Can't Patch
- Immediately isolate affected devices from internet and restrict internal access
- Implement strict network monitoring and alerting for suspicious activity on these devices
🔍 How to Verify
Check if Vulnerable:
Check ArubaOS version via CLI: show version
Check Version:
show version
Verify Fix Applied:
Verify version is patched: show version and confirm version matches patched releases
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution in system logs
- Unauthorized configuration changes
- Unexpected system reboots or service restarts
Network Indicators:
- Unusual outbound connections from SD-WAN devices
- Anomalous traffic patterns through gateways
- Unexpected management interface access attempts
SIEM Query:
source="aruba_device" AND (event_type="command_execution" OR event_type="config_change") AND user="unknown"