CVE-2024-41134

7.2 HIGH

📋 TL;DR

This vulnerability allows remote authenticated users to execute arbitrary commands as root on HPE Aruba EdgeConnect SD-WAN gateways through the CLI. Attackers with valid credentials can achieve complete system compromise. Only HPE Aruba EdgeConnect SD-WAN gateways are affected.

💻 Affected Systems

Products:
  • HPE Aruba Networking EdgeConnect SD-WAN gateway
Versions: All versions prior to 9.4.0.0
Operating Systems: ArubaOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated CLI access; default configurations with CLI enabled are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root privileges, allowing data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation from authenticated user to root, enabling configuration changes, credential theft, and network disruption.

🟢

If Mitigated

Limited impact if strong authentication controls, network segmentation, and least privilege access are enforced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the CLI; once authenticated, command injection is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4.0.0 and later

Vendor Advisory: https://csaf.arubanetworks.com/2024/hpe_aruba_networking_-_hpesbnw04673.txt

Restart Required: Yes

Instructions:

1. Download and install EdgeConnect SD-WAN gateway version 9.4.0.0 or later from HPE Aruba support portal. 2. Apply the update through the management interface. 3. Reboot the gateway as required.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to trusted IP addresses and users only; disable unnecessary CLI services.

Configure access control lists (ACLs) to restrict CLI access to management networks.

Enforce Strong Authentication

all

Implement multi-factor authentication (MFA) and strong password policies for CLI users.

Enable MFA via RADIUS/TACACS+ integration; set complex password requirements.

🧯 If You Can't Patch

  • Isolate affected gateways in a segmented network with strict firewall rules.
  • Monitor CLI access logs for suspicious activity and implement alerting.

🔍 How to Verify

Check if Vulnerable:

Check the gateway version via CLI: 'show version' and verify if it is below 9.4.0.0.

Check Version:

show version

Verify Fix Applied:

After patching, run 'show version' to confirm version is 9.4.0.0 or higher.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command execution patterns
  • Failed authentication attempts followed by successful CLI access
  • Commands with shell metacharacters in CLI logs

Network Indicators:

  • Unexpected outbound connections from the gateway
  • Anomalous traffic patterns post-CLI access

SIEM Query:

source="edgeconnect_gateway" AND (event_type="cli_command" AND command="*;*" OR command="*|*" OR command="*`*" OR command="*$(*)")

🔗 References

📤 Share & Export