ID CVE-2008-7023
Summary Aruba Mobility Controller running ArubaOS 3.3.1.16, and possibly other versions, installs the same default X.509 certificate for all installations, which allows remote attackers to bypass authentication. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's security documentation.
References
Vulnerable Configurations
  • cpe:2.3:h:arubanetworks:aruba_mobility_controller:-:*:*:*:*:*:*:*
    cpe:2.3:h:arubanetworks:aruba_mobility_controller:-:*:*:*:*:*:*:*
  • cpe:2.3:o:arubanetworks:arubaos:3.3.1.16:*:*:*:*:*:*:*
    cpe:2.3:o:arubanetworks:arubaos:3.3.1.16:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 11-10-2018 - 20:58)
Impact:
Exploitability:
CWE CWE-310
CAPEC
  • Signature Spoofing by Key Recreation
    An attacker obtains an authoritative or reputable signer's private signature key by exploiting a cryptographic weakness in the signature algorithm or pseudorandom number generation and then uses this key to forge signatures from the original signer to mislead a victim into performing actions that benefit the attacker.
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 31336
bugtraq
  • 20080923 Aruba Mobility Controller Shared Default Certificate
  • 20080923 Re: Aruba Mobility Controller Shared Default Certificate - Response from Aruba Networks
osvdb 51731
Last major update 11-10-2018 - 20:58
Published 21-08-2009 - 14:30
Last modified 11-10-2018 - 20:58
Back to Top