CVE-2023-35971
📋 TL;DR
This stored cross-site scripting vulnerability in ArubaOS web management interface allows unauthenticated attackers to inject malicious scripts that execute in victims' browsers. Anyone using the vulnerable ArubaOS web interface is affected, potentially leading to session hijacking or administrative compromise.
💻 Affected Systems
- ArubaOS
📦 What is this software?
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Arubaos by Arubanetworks
Arubaos by Arubanetworks
⚠️ Risk & Real-World Impact
Worst Case
Attacker gains administrative access to network devices, modifies configurations, intercepts traffic, or deploys malware across the network.
Likely Case
Session hijacking leading to unauthorized access to network management functions, configuration changes, or credential theft.
If Mitigated
Limited impact with proper network segmentation, web application firewalls, and browser security controls in place.
🎯 Exploit Status
Stored XSS typically requires attacker to inject payload that persists and executes when legitimate users access affected pages.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Aruba advisory ARUBA-PSA-2023-008 for specific patched versions
Vendor Advisory: https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2023-008.txt
Restart Required: Yes
Instructions:
1. Review Aruba advisory ARUBA-PSA-2023-008. 2. Download appropriate firmware update from Aruba support portal. 3. Backup current configuration. 4. Apply firmware update following Aruba's upgrade procedures. 5. Verify interface functionality post-update.
🔧 Temporary Workarounds
Restrict Web Interface Access
allLimit access to ArubaOS web interface to trusted IP addresses only using firewall rules or access control lists.
Configure firewall/ACL to allow only specific source IPs to ArubaOS management interface (typically TCP 80/443)
Disable Web Interface
allUse CLI or serial console for management instead of web interface.
Configure via CLI: no web-management
🧯 If You Can't Patch
- Implement strict network segmentation to isolate management interfaces from untrusted networks
- Deploy web application firewall with XSS protection rules in front of ArubaOS interface
🔍 How to Verify
Check if Vulnerable:
Check ArubaOS version via CLI: show version, then compare against affected versions in Aruba advisory.
Check Version:
show version
Verify Fix Applied:
Verify updated version via CLI: show version, confirm it matches patched version from advisory, test web interface functionality.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to web interface with script tags or JavaScript payloads
- Multiple failed login attempts followed by successful access from new IP
Network Indicators:
- HTTP requests containing <script> tags or JavaScript to ArubaOS management ports
- Unexpected outbound connections from management interface
SIEM Query:
source="aruba_logs" AND (http_method="POST" AND (uri="*" AND content="*<script>*" OR content="*javascript:*"))