Critical vulnerabilities found in 'millions of Aruba and Avaya switches'

SpacemanSpiff

Known around here
Joined
Apr 15, 2021
Messages
1,467
Reaction score
2,470
Location
USA
"Five critical remote code execution vulnerabilities in millions Aruba and Avaya devices can be exploited by cybercriminals to take full control of network switches commonly used in airports, hospitals, and hotels, according to Armis researchers."

 

The Automation Guy

Known around here
Joined
Feb 7, 2019
Messages
1,407
Reaction score
2,795
Location
USA
Thanks for the information. While it is bad to see these types of exploits being available, it's good that they are being found and hopefully patched.

That being said, this one is probably not something the average homeowner needs to worry about. I have Aruba networking switches in my house, but these exploits require local access to the switch which is easiest to do through a captive portal. I doubt many people use a captive portal in their residential setting. I know I never would.
 

SpacemanSpiff

Known around here
Joined
Apr 15, 2021
Messages
1,467
Reaction score
2,470
Location
USA
...
That being said, this one is probably not something the average homeowner needs to worry about.
...
Agreed. I realize the audience here is mostly that, however I believe there are enough techies here, that the information was worth sharing. Both this switch vulnerability, as well as the Schneider UPS security bulletin
 

tech_junkie

Getting comfortable
Joined
Sep 2, 2022
Messages
412
Reaction score
417
Location
South Dakota
"Five critical remote code execution vulnerabilities in millions Aruba and Avaya devices can be exploited by cybercriminals to take full control of network switches commonly used in airports, hospitals, and hotels, according to Armis researchers."

Its yet another reason why managed switches don't belong in a camera network.
 

SpacemanSpiff

Known around here
Joined
Apr 15, 2021
Messages
1,467
Reaction score
2,470
Location
USA
Just because there is no web GUI on a device, does not equate to no software present. Non-managed switches most certainly do have software on them, and there is a risk of it being compromised. Lower odds, but the risk is present.
I recall the report of servers being compromised from some intentional rouge code discovered on one of the chips soldered to the mainboard. They determined it was on the chip when it arrived from its' manufacturer before being installed on the mainboard.
 

MR2

Getting the hang of it
Joined
Jan 25, 2016
Messages
95
Reaction score
33
the best practice for camera's is to IP separate from your main network, so why not switches as well?
 

Mike A.

Known around here
Joined
May 6, 2017
Messages
3,828
Reaction score
6,385
Because they serve to move all of the traffic on your network. Kind of hard to isolate them. A camera is an end point device that's much easier to wall off from things. You can isolate different networks with whatever switches are on it from one another. And you can do VPNs VLANs and things like port isolation to isolate things within switches.
 
Last edited:

SpacemanSpiff

Known around here
Joined
Apr 15, 2021
Messages
1,467
Reaction score
2,470
Location
USA
In addition to what @Mike A. mentioned. Managed switches are assigned their own VLAN (typically 'default' or 'mgmt') & IP scheme, different from any of the network(s) they serve. The switch VLAN & network (IP scheme) is blocked at the firewall.
 

catcamstar

Known around here
Joined
Jan 28, 2018
Messages
1,659
Reaction score
1,193
In addition to what @Mike A. mentioned. Managed switches are assigned their own VLAN (typically 'default' or 'mgmt') & IP scheme, different from any of the network(s) they serve. The switch VLAN & network (IP scheme) is blocked at the firewall.
It's about the wording: "The switch VLAN & Network should be blocked at the firewall." More than often, "laziness" applies "security by obscurity". And then you're an easy target for the cat.
 

SpacemanSpiff

Known around here
Joined
Apr 15, 2021
Messages
1,467
Reaction score
2,470
Location
USA
In addition to what @Mike A. mentioned. Managed switches are assigned their own VLAN (typically 'default' or 'mgmt') & IP scheme, different from any of the network(s) they serve. The switch VLAN & network (IP scheme) is blocked at the firewall.
It's about the wording: "The switch VLAN & Network should be blocked at the firewall." More than often, "laziness" applies "security by obscurity". And then you're an easy target for the cat.
To your point, @catcamstar, "Managed switches are should be assigned to their own VLAN (typically 'default' or 'mgmt') & IP scheme, ..."

Damn the caffeine deficit!
 

Mike A.

Known around here
Joined
May 6, 2017
Messages
3,828
Reaction score
6,385
In addition to what @Mike A. mentioned. Managed switches are assigned their own VLAN (typically 'default' or 'mgmt') & IP scheme, different from any of the network(s) they serve. The switch VLAN & network (IP scheme) is blocked at the firewall.
Doh... I intended to say VLAN instead of VPN above. Must have needed some caffeine myself.
 
Top