CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◇ Industry News & Leadership

Critical HPE AOS-CX Vulnerability Allows Admin Password Resets

Security Week Archived Mar 16, 2026 ✓ Full text saved

The vulnerability can be exploited remotely, without authentication, to circumvent existing authentication controls. The post Critical HPE AOS-CX Vulnerability Allows Admin Password Resets appeared first on SecurityWeek .

Full text archived locally
✦ AI Summary · Claude Sonnet


    Hewlett Packard Enterprise (HPE) this week announced patches for a critical-severity vulnerability in Aruba Networking AOS-CX that could be exploited to reset administrator passwords. The issue, tracked as CVE-2026-23813 (CVSS score of 9.8), impacts the web-based management interface of AOS-CX switches and can be exploited remotely, without authentication, to bypass authentication controls. The bug impacts HPE Aruba Networking CX 4100i, CX 6000, CX 6100, CX 6200, CX 6300, CX 6400, CX 8320, CX 8325, CX 8360, CX 9300, and CX 10000 series switches. The successful exploitation of the security defect could allow attackers to take over vulnerable AOS-CX switches and potentially compromise entire systems, Corsica Technologies CISO Ross Filipek says. “A successful compromise could lead to the disruption of network communications or the erosion of the integrity of key business services. When attackers gain privileged access to these devices, it puts organizations at significant risk,” Filipek said. According to HPE’s advisory, organizations can mitigate the risks associated with CVE-2026-23813 by restricting access to management interfaces and implementing strict access control policies. Organizations are also advised to disable HTTP(S) interfaces on Switched Virtual Interfaces (SVIs) and routed ports, enforce ACLs to ensure only trusted clients connect to the HTTPS/REST endpoints, and to enable comprehensive accounting, logging, and monitoring of management interfaces. HPE Aruba Networking rolled out AOS-CX versions 10.17.1001, 10.16.1030, 10.13.1161, and 10.10.1180 to address the bug. The software updates also resolve three high-severity vulnerabilities (tracked as CVE-2026-23814, CVE-2026-23815, and CVE-2026-23816) in AOS-CX that could allow authenticated, remote attackers to inject and execute malicious commands. Additionally, they address a medium-severity issue that could be exploited by unauthenticated, remote attackers to redirect users to arbitrary URLs. HPE says it is not aware of any of these vulnerabilities being exploited in the wild. Users are advised to apply the security updates as soon as possible. Related: How to 10x Your Vulnerability Management Program in the Agentic Era Related: Chrome 146 Update Patches Two Exploited Zero-Days Related: Apple Updates Legacy iOS Versions to Patch Coruna Exploits Related: Splunk, Zoom Patch Severe Vulnerabilities WRITTEN BY Ionut Arghire Ionut Arghire is an international correspondent for SecurityWeek. More from Ionut Arghire Bold Security Emerges From Stealth With $40 Million in Funding Google Paid Out $17 Million in Bug Bounty Rewards in 2025 Onyx Security Launches With $40 Million in Funding Chrome 146 Update Patches Two Exploited Zero-Days Ally WordPress Plugin Flaw Exposes Over 200,000 Websites to Attacks Splunk, Zoom Patch Severe Vulnerabilities Cisco Patches High-Severity IOS XR Vulnerabilities Critical N8n Vulnerabilities Allowed Server Takeover Latest News Oracle EBS Hack: Only 4 Corporate Giants Still Silent on Potential Impact Security Firm Executive Targeted in Sophisticated Phishing Attack China-Linked Hackers Hit Asian Militaries in Patient Espionage Operation Threat Actor Targeting VPN Users in New Credential Theft Campaign ForceMemo: Python Repositories Compromised in GlassWorm Aftermath Hacking Attempt Reported at Poland’s Nuclear Research Center Loblaw Data Breach Impacts Customer Information Starbucks Data Breach Impacts Employees Trending Webinar: Securing Fragile OT In An Exposed World March 10, 2026 Get a candid look at the current OT threat landscape as we move past "doom and gloom" to discuss the mechanics of modern OT exposure. Register Virtual Event: Supply Chain Security And Third-Party Risk Summit March 18, 2026 Join the event where top security experts unpack the biggest software supply chain risks. Register People on the Move The US Senate has confirmed Army Lt. Gen. Joshua Rudd to lead NSA and CYBERCOM. Business software company Rippling has appointed Adrian Ludwig as CSO. Orca Security has named Rachel Nislick as Chief Marketing Officer. More People On The Move Expert Insights The Human IOC: Why Security Professionals Struggle With Social Vetting Applying SOC-level rigor to the rumors, politics, and 'human intel' can make or break a security team. (Joshua Goldfarb) How To 10x Your Vulnerability Management Program In The Agentic Era The evolution of vulnerability management in the agentic era is characterized by continuous telemetry, contextual prioritization and the ultimate goal of agentic remediation. (Nadir Izrael) SIM Swaps Expose A Critical Flaw In Identity Security SIM swap attacks exploit misplaced trust in phone numbers and human processes to bypass authentication controls and seize high-value accounts. (Torsten George) Four Risks Boards Cannot Treat As Background Noise The goal isn’t about preventing every attack but about keeping the business running when attacks succeed. (Steve Durbin) How To Eliminate The Technical Debt Of Insecure AI-Assisted Software Development Developers must view AI as a collaborator to be closely monitored, rather than an autonomous entity to be unleashed. Without such a mindset, crippling tech debt is inevitable. (Matias Madou) Flipboard Reddit Whatsapp Email
    💬 Team Notes
    Article Info
    Source
    Security Week
    Category
    ◇ Industry News & Leadership
    Published
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗