back to article Critical vulnerabilities found in 'millions of Aruba and Avaya switches'

Five critical remote code execution vulnerabilities in millions Aruba and Avaya devices can be exploited by cybercriminals to take full control of network switches commonly used in airports, hospitals, and hotels, according to Armis researchers. The security firm discovered the bugs, collectively called TLStorm 2.0, and said …

  1. Pascal Monett Silver badge
    Trollface

    Well there's your problem

    You didn't use Cisco equipment, that can only be backdoored by the NSA.

    1. Anonymous Coward
      Anonymous Coward

      Re: Well there's your problem

      If No Such Agency can backdoor it, then Fairly Universal Criminals Kickin too.

    2. EnviableOne

      Re: Well there's your problem

      they'll get to C for cisco soon,

      they're just finishing the A's APC, Aruba, Avaya ...

      1. Yet Another Anonymous coward Silver badge

        Re: Well there's your problem

        If it was Huawei then it could just be poor programming practice - but since this is HPE, the USA's foremost enterprise systems supplier and inheritor of the great engineering of Hewlett Packard - it can only be a deliberate backdoor

        1. Paul Crawford Silver badge
          Trollface

          Re: Well there's your problem

          Very true, why bother with Hanlon's razor?

        2. VoiceOfTruth Silver badge

          Re: Well there's your problem

          If it was Huawei cue the USA shouting 'Chinese backdoors'.

          1. Yet Another Anonymous coward Silver badge

            Re: Well there's your problem

            But GCHQ did an analysis and showed that it was Huawei's poor programming that led to security vulnerabilities and so it should be banned from UK networks.

            It's only in America that Huawei's super cyber-ninja programmers were able to hide undetectable backdoors which couldn't be found even when you analysed the source code.

            1. VoiceOfTruth Silver badge

              Re: Well there's your problem

              -> But GCHQ did an analysis and showed that it was Huawei's poor programming that led to security vulnerabilities and so it should be banned from UK networks.

              Do you actually believe that nonsense? Huawei was banned in the UK because the American overlord said 'ban it'. Johnson replied 'how quickly do you want it banned, oh great one?'

              1. Yet Another Anonymous coward Silver badge

                Re: Well there's your problem

                But wasn't this after a new dynamic Global Britain bestode the world as a veritable colossus ?

                1. Jellied Eel Silver badge

                  Re: Well there's your problem

                  I'm thinking more the StayPuft marshmallow man.

                  But I think that was from an era when RADIUS attacks were common. So bit suprised there are still overflow problems.

      2. Anonymous Coward
        Anonymous Coward

        Looks like they already did

        https://www.armis.com/research/cdpwn/

      3. Chris King

        Re: Well there's your problem

        Would Cisco or Juniper even NEED SSL/TLS bugs, given all their telnet backdoors over the years?

        1. Yet Another Anonymous coward Silver badge

          Re: Well there's your problem

          Lots of systems don't ship with a telnet client anymore, so script kiddies need to use ssh to hack systems

  2. Mike 137 Silver badge

    No longer just a 'consumer' and SOHO problem any more

    All this kit is in the $1k to c. $10k bracket, so it's definitely corporate gear. What a pity that it seems to be about the same quality as a typical home router.

    1. Paul Crawford Silver badge

      Re: No longer just a 'consumer' and SOHO problem any more

      Probably less, if you have flashed your home one with OpenWRT or similar.

    2. VoiceOfTruth Silver badge

      Re: No longer just a 'consumer' and SOHO problem any more

      Let's be honest. Pretty much all hardware and software out there has bugs and holes in it. It's just a matter of time before it is compromised.

      1. An_Old_Dog Silver badge
        Facepalm

        Reduce the Attack Surface

        Part of the problem is the wrong belief that everything should have a web interface and should be super-easily remotely-accessible.

        Our now-old Avaya phone switch used direct serial connections to the computers used to administer it. Those computers were in a physically-secured location, and did not have access to or from the Internet. Remote admin was via callback modems.

        1. VoiceOfTruth Silver badge

          Re: Reduce the Attack Surface

          -> Part of the problem is the wrong belief that everything should have a web interface and should be super-easily remotely-accessible.

          Yes! You've hit on a big thing there. The 'wrong belief'...

          1. Yet Another Anonymous coward Silver badge

            Re: Reduce the Attack Surface

            You try remotely hacking my punch card programmed router

        2. Nick Ryan Silver badge

          Re: Reduce the Attack Surface

          Our old Avaya phone switch didn't have a web interface but was still vulnerable as hell. Even just the act of security scanning the damn thing made the phone system crap itself (we had to be very sure to tell pen testers not to scan it in any way)

    3. SnOOpy168

      Re: No longer just a 'consumer' and SOHO problem any more

      it could be a consumer-grade router that is reboxed into an "enterprise" item with a price point to match. hey, there are plenty of layers to feed in that route, so this fat is required.

  3. StrangerHereMyself Silver badge

    Sjeesh

    Sjeesh, you pay good money to license a SSL software stack and they screw it up just the same.

    It makes you wonder, why are we paying for software anyway? There are open-source and free alternatives for almost everything, yet companies insist on paying people money so they can get "support" which consists of nothing more than someone answering the phone and listening to their lamenting the poor quality of the software.

    1. VoiceOfTruth Silver badge

      Re: Sjeesh

      Wow. I mean, it's not like open source software has bugs, izzit? And just because a very large chunk of the open source community lives in la-la land with the belief that 'the community' (meaning somebody else) is carefully checking all the source out there, doesn't make it so.

      Why are we paying for software (in comparison to free or open source software)? It's because we can ring somebody up and say 'please fix this bug in your code', rather than saying 'the community will fix it'.

      1. Yet Another Anonymous coward Silver badge

        Re: Sjeesh

        I think if you are a $15Bn Enterprise IT company you might pay somebody to look over the code of openSSH, or at least have one of your staff search for "openSSH bugs"

        Alternately you could just buy nanoSSL cos it was cheapest and because their brochure says it's secure

        1. VoiceOfTruth Silver badge

          Re: Sjeesh

          You would have to find somebody competent to do it. The reason why some people pay mechanics to change the oil in their car is because they don't know how to do it themselves. It's the same with software, and even more so with software related to security.

          I don't know how cheap of expensive nanoSSL is, nor if they make any more claims about security than any other software provider. But unless you write all the software yourself (see point about competency), you will be buying it in or using free or open source somewhere along the way.

          1. Yet Another Anonymous coward Silver badge

            Re: Sjeesh

            I'm assuming they can find and afford world class tax accountants so they can probably have afforded a few $ to audit openSSL and use that.

            They could even have been nice and shared the results

            1. AndrewB57

              Re: Sjeesh

              The reason corporate entities spring for paid-for kit is not just that you can ring up and get "support", it is so that someone else warrants the fitness of the item concerned.

              Most businesses cannot afford to rely on in-house s/w checking - why should they if they are a hospital, or an airport? They should be doing due diligence on suppliers and then relying on THEIR resources to guard against nasties (and to fix sh1t when it goes wrong).

              1. StrangerHereMyself Silver badge

                Re: Sjeesh

                The support consists of a patch whilst you have millions of routers and switches in the field you need to update? Most of those switches have been out of support for years.

                Software this critical simply needs to be bug-free. You cannot afford to have to update it many years later. Worst case the company that supplied the software folded or moved on into other fields and isn't interested in supporting it anymore.

            2. VoiceOfTruth Silver badge

              Re: Sjeesh

              To audit OpenSSL is more than a few $. If I remember correctly it is partially audited. And it also requires finding the right people to do it. The software world's counterpart to Bob the builder cannot even begin to get started with it.

  4. Teejay

    But what is safe?

    Can anything that can be accessed from the outside ever be considered safe? For example, I guess half of all mobile phones with Qualcomm Wifi / Bluetooth / 2/3/4/5G chipset are instantly hackable, due to known vulnerabilities and missing updates.

    1. Nick Ryan Silver badge

      Re: But what is safe?

      A major part of "safe" is to restrict the surface area of the attack.

      The support staff at our MSP just could not get their head around why I insisted that the remote support web page for our Internet firewall be either disabled or locked to a couple of specified IP addresses and not just left open to the public Internet. Their claim was that "it is protected with a strong password" was their reason for their blinkered naive concept of safety... different supplier but these exploits take place before the supply of a password.

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Other stories you might like