Lucene search

K
nessusThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.ARUBAOS_KRACK.NASL
HistoryOct 16, 2017 - 12:00 a.m.

ArubaOS WPA2 Key Reinstallation Vulnerabilities (KRACK)

2017-10-1600:00:00
This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
www.tenable.com
40

The version of ArubaOS on the remote device is affected by multiple vulnerabilities related to the KRACK attacks. This may allow an attacker to decrypt, replay, and forge some frames on a WPA2 encrypted network.

Note: ArbuaOS devices are only vulnerable to CVE-2017-13077, CVE-2017-13078,CVE-2017-13079, CVE-2017-13080, and CVE-2017-13081 while operating as a Wi-Fi supplicant in Mesh mode.

#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(103855);
  script_version("1.13");
  script_cvs_date("Date: 2019/11/12");

  script_cve_id(
    "CVE-2017-13077",
    "CVE-2017-13078",
    "CVE-2017-13079",
    "CVE-2017-13080",
    "CVE-2017-13081",
    "CVE-2017-13082"
  );
  script_xref(name:"IAVA", value:"2017-A-0310");

  script_name(english:"ArubaOS WPA2 Key Reinstallation Vulnerabilities (KRACK)");
  script_summary(english:"Checks the ArubaOS version.");

  script_set_attribute(attribute:"synopsis", value:
"The version of ArubaOS is affected by a MitM vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of ArubaOS on the remote device is affected by
multiple vulnerabilities related to the KRACK attacks. This may
allow an attacker to decrypt, replay, and forge some frames on 
a WPA2 encrypted network.

Note: ArbuaOS devices are only vulnerable to CVE-2017-13077, 
CVE-2017-13078,CVE-2017-13079, CVE-2017-13080, and CVE-2017-13081 
while operating as a Wi-Fi supplicant in Mesh mode.");
  script_set_attribute(attribute:"see_also", value:"https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2017-007.txt");
  script_set_attribute(attribute:"solution", value:
"Upgrade to 6.3.1.25 / 6.4.4.16 / 6.5.1.9
    / 6.5.3.3 / 6.5.4.2 / 8.1.0.4 or later.");
  script_set_cvss_base_vector("CVSS2#AV:A/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-13082");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");
  script_set_attribute(attribute:"in_the_news", value:"true");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/10/16");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/10/16");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/10/16");

  script_set_attribute(attribute:"potential_vulnerability", value:"true");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:arubanetworks:arubaos");
  script_set_attribute(attribute:"stig_severity", value:"II");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("arubaos_detect.nbin");
  script_require_keys("Host/ArubaNetworks/model", "Host/ArubaNetworks/ArubaOS/version", "Settings/ParanoidReport");

  exit(0);
}

include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");

model = get_kb_item_or_exit("Host/ArubaNetworks/model");
display_version = get_kb_item_or_exit("Host/ArubaNetworks/ArubaOS/version");

if(report_paranoia < 2) audit(AUDIT_POTENTIAL_VULN, "ArubaOS", display_version);

# Version may contain -FIPS at the end, unable to verify
version = ereg_replace(pattern:"-FIPS", replace:"", string:display_version);
fix = NULL;
 # -- ArubaOS (all versions prior to 6.3.1.25)
 # -- ArubaOS 6.4 prior to 6.4.4.16
 # -- ArubaOS 6.5.0.x
 # -- ArubaOS 6.5.1 prior to 6.5.1.9
 # -- ArubaOS 6.5.2.x
 # -- ArubaOS 6.5.3 prior to 6.5.3.3
 # -- ArubaOS 6.5.4 prior to 6.5.4.2
 # -- ArubaOS 8.x prior to 8.1.0.4

if ( version =~ "^8\." ) fix = "8.1.0.4";
else if ( version =~ "^6\.5\.4" ) fix = "6.5.4.2";
else if ( version =~ "^6\.5\.[23]" ) fix = "6.5.3.3";
else if ( version =~ "^6\.5\.[01]" ) fix = "6.5.1.9";
else if ( version =~ "^6\.4" ) fix = "6.4.4.16";
else fix = "6.3.1.25";

if (ver_compare(ver:version, fix:fix, strict:FALSE) < 0)
{ 
  if ("FIPS" >< display_version) fix += "-FIPS";
  report =
    '\n  Model             : ' + model +
    '\n  Installed version : ' + display_version +
    '\n  Fixed version     : ' + fix +
    '\n';
  security_report_v4(severity:SECURITY_WARNING, port:0, extra:report);
}
else audit(AUDIT_DEVICE_NOT_VULN, "The ArubaOS device", display_version);
VendorProductVersionCPE
arubanetworksarubaoscpe:/o:arubanetworks:arubaos