HPE warns of critical AOS-CX flaw allowing admin password resets
嗯,用户让我用中文总结一下这篇文章的内容,控制在100个字以内,而且不需要以“文章内容总结”或“这篇文章”这样的开头。直接写描述就行。 首先,我需要通读整篇文章,抓住主要信息。文章讲的是HPE修补了Aruba Networking AOS-CX操作系统中的多个安全漏洞,包括身份验证绕过和代码执行问题。其中最严重的是CVE-2026-23813,允许无权限的攻击者重置管理员密码。HPE建议了一些缓解措施,并提到目前还没有公开的利用代码或证据显示这些漏洞被滥用。 接下来,我需要把这些信息浓缩到100字以内。重点包括:HPE修补了AOS-CX的漏洞,特别是身份验证绕过问题,允许攻击者重置密码,并建议了一些缓解措施。 然后,我要确保语言简洁明了,不使用复杂的术语,同时保持信息的完整性。比如,“修补了多个安全漏洞”比详细列出每个漏洞更合适。 最后,检查字数是否在限制内,并且确保没有使用任何禁止的开头语句。 </think> HPE修复了Aruba AOS-CX操作系统中的多个安全漏洞,包括身份验证绕过和代码执行问题。其中最严重的是CVE-2026-23813,允许无权限攻击者重置管理员密码。HPE建议采取限制访问、启用控制列表等措施缓解风险。 2026-3-10 17:32:30 Author: www.bleepingcomputer.com(查看原文) 阅读量:2 收藏

Hewlett Packard Enterprise HPE

Hewlett Packard Enterprise (HPE) has patched multiple security vulnerabilities in the Aruba Networking AOS-CX operating system, including several authentication and code execution issues.

AOS-CX is a cloud-native network operating system (NOS) developed by HPE subsidiary Aruba Networks for the company's CX-series campus and data center switch devices.

The most severe security flaw today is a critical authentication bypass vulnerability (tracked as CVE-2026-23813) that attackers without privileges can exploit in low-complexity attacks to reset admin passwords.

"A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the admin password," HPE said.

"HPE Aruba Networking is not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory."

IT admins who can't immediately apply today's security updates to patch vulnerable switches can take one of the following mitigation measures:

  • Restrict access to all management interfaces to a dedicated Layer 2 segment or VLAN to isolate management traffic.
  • Implement strict policies at Layer 3 and above to control access to management interfaces, allowing only authorized and trusted hosts.
  • Disable HTTP(S) interfaces on Switched Virtual Interfaces (SVIs) and routed ports wherever management access is not required.
  • Enforce Control Plane Access Control Lists (ACLs) to protect any REST/HTTP-enabled management interfaces, ensuring only trusted clients are allowed to connect to the HTTPS/REST endpoints.
  • Enable comprehensive accounting, logging, and monitoring of all management interface activities to detect and respond to unauthorized access attempts.

HPE has yet to find publicly available proof-of-concept exploit code or evidence that attackers are abusing the vulnerabilities in the wild.

In July 2025, the company also warned of hardcoded credentials in Aruba Instant On Access Points that could allow attackers to bypass standard device authentication.

One month earlier, HPE patched eight vulnerabilities in its StoreOnce disk-based backup and deduplication solution, including another critical-severity authentication bypass and three remote code execution flaws.

More recently, in January, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) flagged a maximum-severity HPE OneView vulnerability as exploited in attacks.

HPE has over 61,000 employees worldwide, has reported revenues of $30.1 billion in 2024, and provides services and products to over 55,000 enterprise customers worldwide, including 90% of Fortune 500 companies.

tines

Red Report 2026: Why Ransomware Encryption Dropped 38%

Malware is getting smarter. The Red Report 2026 reveals how new threats use math to detect sandboxes and hide in plain sight.

Download our analysis of 1.1 million malicious samples to uncover the top 10 techniques and see if your security stack is blinded.


文章来源: https://www.bleepingcomputer.com/news/security/hpe-warns-of-critical-aos-cx-flaw-allowing-admin-password-resets/
如有侵权请联系:admin#unsafe.sh