Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

The vulnerability can be exploited remotely, without authentication, to circumvent existing authentication controls.

HPE vulnerability

Hewlett Packard Enterprise (HPE) this week announced patches for a critical-severity vulnerability in Aruba Networking AOS-CX that could be exploited to reset administrator passwords.

The issue, tracked as CVE-2026-23813 (CVSS score of 9.8), impacts the web-based management interface of AOS-CX switches and can be exploited remotely, without authentication, to bypass authentication controls.

The bug impacts HPE Aruba Networking CX 4100i, CX 6000, CX 6100, CX 6200, CX 6300, CX 6400, CX 8320, CX 8325, CX 8360, CX 9300, and CX 10000 series switches.

The successful exploitation of the security defect could allow attackers to take over vulnerable AOS-CX switches and potentially compromise entire systems, Corsica Technologies CISO Ross Filipek says.

“A successful compromise could lead to the disruption of network communications or the erosion of the integrity of key business services. When attackers gain privileged access to these devices, it puts organizations at significant risk,” Filipek said.

According to HPE’s advisory, organizations can mitigate the risks associated with CVE-2026-23813 by restricting access to management interfaces and implementing strict access control policies.

Advertisement. Scroll to continue reading.

Organizations are also advised to disable HTTP(S) interfaces on Switched Virtual Interfaces (SVIs) and routed ports, enforce ACLs to ensure only trusted clients connect to the HTTPS/REST endpoints, and to enable comprehensive accounting, logging, and monitoring of management interfaces.

HPE Aruba Networking rolled out AOS-CX versions 10.17.1001, 10.16.1030, 10.13.1161, and 10.10.1180 to address the bug.

The software updates also resolve three high-severity vulnerabilities (tracked as CVE-2026-23814, CVE-2026-23815, and CVE-2026-23816) in AOS-CX that could allow authenticated, remote attackers to inject and execute malicious commands.

Additionally, they address a medium-severity issue that could be exploited by unauthenticated, remote attackers to redirect users to arbitrary URLs.

HPE says it is not aware of any of these vulnerabilities being exploited in the wild. Users are advised to apply the security updates as soon as possible.

Related: How to 10x Your Vulnerability Management Program in the Agentic Era

Related: Chrome 146 Update Patches Two Exploited Zero-Days

Related: Apple Updates Legacy iOS Versions to Patch Coruna Exploits

Related: Splunk, Zoom Patch Severe Vulnerabilities

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.