Aruba Networks patches critical Struts 2 vulnerability

By

Security roll-up covers ten vulns.

Aruba Networks has joined the list of vendors whose software could have inherited last year’s Apache Struts 2 vulnerability.

Aruba Networks patches critical Struts 2 vulnerability

The Struts 2 bug, CVE-2023-50164, first emerged in December, and allows an attacker to manipulate file upload parameters to achieve remote code execution.

Proof-of-concept code was published within days of the bug being disclosed.

Aruba said in an advisory that "the impact of this vulnerability on [its] ClearPass Policy Manager [product] has not been confirmed, but the version of Apache Struts has been upgraded for mitigation.”

Cisco patched the vulnerability when it was disclosed in December, and Dell patched the bug earlier this month.

The patch is part of a roll-up by Aruba covering a total of 10 CVEs, five of which carry a CVSS score of 7.2 (high severity).

CVE-2024-26294, CVE-2024-26295, CVE-2024-26296, CVE-2024-26297 and CVE-2024-26298 are all vulnerabilities in the ClearPass Policy Manager web-based management interface.

All five allow remote, authenticated users to run arbitrary commands as root on the underlying operating system.

There are another four medium-rated vulnerabilities: CVE-2024-26299, CVE-2024-26300, CVE-2024-26301 and CVE-2024-26302.

Affected versions are in the ClearPass Policy Manager 6.12.x, 6.11.x, 6.10.x, and 6.9.x software branches.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Palo Alto Networks in talks to buy CyberArk

Palo Alto Networks in talks to buy CyberArk

Gov to encourage vuln research, puts insurers and NFPs on notice

Gov to encourage vuln research, puts insurers and NFPs on notice

"Scattered Spider" evolves with new ransomware and social engineering tactics

"Scattered Spider" evolves with new ransomware and social engineering tactics

Nvidia says its chips have no 'backdoors'

Nvidia says its chips have no 'backdoors'

Log In

  |  Forgot your password?