- HPE fixes five vulnerabilities in Aruba AOS-CX
- A critical flaw (CVE-2026-23813) allowed the administrator password to be reset
- Company Requests Mitigation Measures Until Patches Are Applied
Hewlett Packard Enterprise (HPE) has alerted its customers after discovering five vulnerabilities in its products, including one that cybercriminals could exploit to take over certain endpoints.
In a recently released security advisory, HPE said it has fixed a critical authentication bypass flaw that can be used by unauthenticated attackers in low-complexity attacks to reset administrator passwords. The bug is now tracked as CVE-2026-23813 and has a severity score of 9.1/10 (critical).
This affects the Aruba Networking AOS-CX operating system, a cloud-native network operating system designed for HPE CX Series campus and data center switching hardware.
Article continues below
Fixes and workarounds
βA vulnerability has been identified in the web-based management interface of AOS-CX switches that could potentially allow an unauthenticated remote actor to bypass existing authentication controls,β HPE said in the advisory. βIn some cases, this could reset the administrator password.β
The other four vulnerabilities are now tracked as CVE-2026-23814, CVE-2026-23815, CVE-2026-23816, and CVE-2026-23817, apparently affecting AOS-CX 10.17.xxxx: 10.17.0001 and earlier, AOS-CX 10.16.xxxx: 10.16.1020 and lower, AOS-CX 10.13.xxxx: 10.13.1160 and lower, and AOS-CX 10.10.xxxx: 10.10.1170 and lower.
The good news is that no abuse has yet been reported in the wild.
If you cannot apply the patch immediately, HPE has also shared a list of possible mitigation measures:
Restrict access to all management interfaces to a dedicated Layer 2 segment or VLAN to isolate management traffic from general network traffic,
Implement strict policies at layer 3 and above to control access to management interfaces, allowing only authorized and trusted hosts,
Disable HTTP(S) interfaces on switched virtual interfaces (SVI) and routed ports anywhere management access is not required,
Apply access control lists (ACLs) to the control plane to protect all REST/HTTP-compliant management interfaces, ensuring that only trusted clients are allowed to connect to HTTPS/REST endpoints,
Enable comprehensive accounting, logging and monitoring of all management interface activity to quickly detect and respond to unauthorized access attempts.
Via BeepComputer
The best antivirus for every budget
Follow TechRadar on Google News And add us as your favorite source to get our news, reviews and expert opinions in your feeds. Make sure to click the Follow button!
And of course you can too follow TechRadar on TikTok for news, reviews, unboxings in video form and receive regular updates from us on WhatsApp Also.




