recent
Hot News

Critical TLStorm 2.0 Bugs Affect Extensively- Used Aruba and Avaya Network Switches

Home

Cybersecurity experimenters have detailed as numerous as five severe security excrescencies in the perpetration of TLS protocol in several models of Aruba and Avaya network switches that could be abused to gain remote access to enterprise networks and steal precious information.

Critical TLStorm 2.0 Bugs Affect Extensively

The findings follow the March exposure of TLStorm, a set of three critical excrescencies in APC Smart-UPS bias that could permit an bushwhacker to take over control and, worse, physically damage the appliances.

IoT security establishment Armis, which uncovered the failings, noted that the design excrescencies can be traced back to a common source a abuse of NanoSSL, a norms- grounded SSL inventor suite from Mocana, a DigiCert attachment. 

The new set of excrescencies, dubbed TLStorm2.0, renders Aruba and Avaya network switches vulnerable to remote law prosecution vulnerabilities, enabling an adversary to commandeer the bias, move indirectly across the network, and exfiltrate sensitive data.

Affected bias include Avaya ERS3500 Series, ERS3600 Series, ERS4900 Series, and ERS5900 Series as well as Aruba 5400R Series, 3810 Series, 2920 Series, 2930F Series, 2930M Series, 2530 Series, and 2540 Series.

Armis - TLStorm 2.0 Vulnerabilities from Armis Marketing on Vimeo.

Armis chalked up the excrescencies to an" edge case,"a failure to cleave to guidelines pertaining to the NanoSSL library that could affect in remote law prosecution. The list of remote law prosecution bugs is as follows

  • CVE-2022-23676 (CVSS score: 9.1) - Two memory corruption vulnerabilities in the RADIUS client implementation of Aruba switches
  • CVE-2022-23677 (CVSS score: 9.0) - NanoSSL misuse on multiple interfaces in Aruba switches
  • CVE-2022-29860 (CVSS score: 9.8) - TLS reassembly heap overflow vulnerability in Avaya switches
  • CVE-2022-29861 (CVSS score: 9.8) - HTTP header parsing stack overflow vulnerability in Avaya switches
  • HTTP POST request handling heap overflow vulnerability in a discontinued Avaya product line (no CVE)

"These exploration findings are significant as they punctuate that the network structure itself is at threat and exploitable by bushwhackers, meaning that network segmentation alone is no longer sufficient as a security measure,"Barak Hadad, head of exploration in engineering at Armis, said.

Associations planting impacted Avaya and Aruba bias are largely recommended to apply the patches to alleviate any eventuality exploit attempts.

google-playkhamsatmostaqltradent