Hewlett Packard Enterprise fixes critical authentication bypass in Aruba AOS-CX
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。用户已经提供了文章的详细内容,我得先仔细阅读并理解文章的主要信息。 文章主要讲的是Hewlett Packard Enterprise(HPE)修复了Aruba AOS-CX操作系统中的多个漏洞。其中最严重的是CVE-2026-23813,CVSS评分9.8,允许未授权攻击者绕过认证重置管理员密码。此外还有其他几个漏洞,涉及命令注入和开放重定向等问题。HPE还提到了一些缓解措施,比如隔离管理接口、限制访问等。同时,文章还提到HPE在2025年7月披露了Aruba Instant On设备中的硬编码凭证漏洞。 接下来,我需要将这些信息浓缩到100字以内。重点包括:HPE修复了Aruba AOS-CX的多个漏洞,特别是严重的认证绕过漏洞,允许攻击者重置密码;还有其他漏洞如命令注入和重定向;以及之前披露的硬编码凭证问题。 现在组织语言,确保简洁明了,不使用“这篇文章”或“内容总结”这样的开头。可能的结构是:HPE修复了Aruba AOS-CX中的多个高危漏洞,包括允许攻击者绕过认证重置密码的问题,并建议采取隔离管理接口等措施以降低风险。 </think> Hewlett Packard Enterprise修复了Aruba AOS-CX中的多个高危漏洞,包括允许未授权攻击者绕过认证并重置管理员密码的问题,并建议采取隔离管理接口等措施以降低风险。 2026-3-11 11:28:36 Author: securityaffairs.com(查看原文) 阅读量:6 收藏

Hewlett Packard Enterprise fixes critical authentication bypass in Aruba AOS-CX

Hewlett Packard Enterprise (HPE) fixed several flaws in Aruba AOS-CX, including a critical bug that lets attackers reset admin passwords.

Hewlett Packard Enterprise (HPE) patched multiple vulnerabilities in Aruba AOS-CX, the operating system used in Aruba CX switches. The most severe issue, tracked as CVE-2026-23813 (CVSS score of 9.8), allows unprivileged attackers to bypass authentication and reset administrator passwords via a low-complexity attack.

“A vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to circumvent existing authentication controls. In some cases this could enable resetting the admin password.” reads the advisory.

To reduce the risk from CVE-2026-23813, Hewlett Packard Enterprise recommends isolating management interfaces on a dedicated VLAN, limiting access only to trusted hosts, disabling unnecessary HTTP/HTTPS management interfaces, enforcing ACLs for REST/HTTPS access, and enabling logging and monitoring to quickly detect unauthorized activity.

The researcher moonv reported the vulnerability through HPE Aruba Networking’s Bug Bounty program.

HPE also addressed the following vulnerabilities:

  • CVE-2026-23814 (CVSS score of 8.8) – Authenticated Command Injection in AOS-CX CLI command lets low-privilege remote attackers inject malicious commands via crafted parameters, leading to arbitrary code execution.
  • CVE-2026-23815 (CVSS score of 7.2) – Authenticated Command Injection in high-privilege AOS-CX CLI custom binary allows remote attackers to execute unauthorized OS commands on the underlying system.
  • CVE-2026-23816 (CVSS score of 7.2) – Authenticated Command Injection in AOS-CX CLI allows remote attackers to execute arbitrary OS commands via crafted input in the command line interface.
  • CVE-2026-23817 (CVSS score of 6.5) – Unauthenticated Open Redirect in AOS-CX web interface enables remote attackers to redirect users to arbitrary malicious URLs via crafted requests, potentially leading to phishing attacks.

HPE Aruba Networking has no evidence of attacks in the wild exploiting these vulnerabilities.

“HPE Aruba Networking is not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory.” conitnues the advisory.

In July 2025, HPE disclosed hardcoded credentials in Aruba Instant On Wi-Fi devices that allow attackers to bypass login and access the web interface. The flaw tracked as CVE-2025-37103 (CVSS score of 9.8) impacts devices running firmware version 3.2.0.1 and below.

Aruba Instant On is a line of plug-and-play Wi-Fi access points are designed specifically for small and medium-sized businesses (SMBs). The product provides reliable, secure, and easy-to-manage wireless networks without the complexity or cost of enterprise systems.

“Hardcoded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication.” reads the advisory. “Successful exploitation could allow a remote attacker to gain administrative access to the system.”

In July 2025, HPE disclosed hardcoded credentials in Aruba Instant On Wi-Fi devices that allow attackers to bypass login and access the web interface. The flaw tracked as CVE-2025-37103 (CVSS score of 9.8) impacts devices running firmware version 3.2.0.1 and below.

Aruba Instant On is a line of plug-and-play Wi-Fi access points are designed specifically for small and medium-sized businesses (SMBs). The product provides reliable, secure, and easy-to-manage wireless networks without the complexity or cost of enterprise systems.

“Hardcoded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication.” reads the advisory. “Successful exploitation could allow a remote attacker to gain administrative access to the system.”

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, HPE)




文章来源: https://securityaffairs.com/189278/security/hewlett-packard-enterprise-fixes-critical-authentication-bypass-in-aruba-aos-cx.html
如有侵权请联系:admin#unsafe.sh