HPE AOS-CX Switches Vulnerable to Admin Password Reset (CVSS 9.8)
CVE-2026-23813 allows unauthenticated attackers to reset admin passwords on HPE Aruba AOS-CX switches. No exploitation seen yet, but patch immediately.
Hewlett Packard Enterprise has disclosed a critical authentication bypass vulnerability in its Aruba AOS-CX switch operating system that could allow remote attackers to reset administrator passwords without credentials.
The flaw, tracked as CVE-2026-23813, carries a CVSS score of 9.8 and affects the web-based management interface across multiple AOS-CX switch families. Successful exploitation gives attackers full administrative control over enterprise network infrastructure—a worst-case scenario for any organization relying on these devices.
What's Vulnerable
The vulnerability exists in the web management interface of the following Aruba switch series:
- CX 4100i
- CX 6000, 6100, 6200, 6300, 6400
- CX 8320, 8325, 8360
- CX 9300
- CX 10000
The attack is low-complexity and requires no authentication. An attacker with network access to the management interface can simply craft a request that bypasses authentication controls and resets the administrator password. From there, they own the switch.
This vulnerability pattern—authentication bypass in network appliances—continues to plague enterprise equipment. We've seen similar issues across vendors this year, though few reach CVSS 9.8.
Three More Command Injection Flaws
HPE's security bulletin addresses four vulnerabilities total. Beyond the critical auth bypass, three high-severity command injection flaws affect the CLI:
- CVE-2026-23814 (CVSS 8.8): Authenticated remote attackers can inject commands via crafted CLI parameters
- CVE-2026-23815 (CVSS 7.2): Command injection in high-privilege CLI binaries
- CVE-2026-23816 (CVSS 7.2): Additional CLI command injection vector
A fifth issue, CVE-2026-23817 (CVSS 6.5), enables unauthenticated open redirects through the web interface.
The command injection flaws require authentication to exploit, but attackers who chain CVE-2026-23813 with any of these could achieve arbitrary code execution on compromised switches.
No Exploitation Yet—Patch Anyway
HPE states there's no evidence of active exploitation. But the severity score and attack simplicity make this a race against time once proof-of-concept code appears.
Security researcher "moonv" discovered the vulnerability and reported it through HPE's Aruba Networking Bug Bounty program.
Organizations should upgrade to patched AOS-CX versions immediately. The specific fixed versions vary by switch model—check HPE's security advisory for your hardware.
If patching isn't possible right now, HPE recommends these mitigations:
- Isolate management interfaces on dedicated VLANs
- Restrict management access to trusted hosts only
- Disable HTTP/HTTPS management interfaces where unnecessary
- Enforce access control lists for REST/HTTPS access
- Enable comprehensive logging and monitoring
The last point matters for detection. Organizations should monitor for unusual authentication attempts or password changes on network equipment, especially from unexpected source IPs.
Network Equipment Under Siege
This disclosure continues a pattern of critical vulnerabilities in network infrastructure. We covered Cisco SD-WAN flaws exploited by sophisticated threat actors earlier this month, and BeyondTrust's pre-auth RCE affecting over 11,000 exposed instances.
Network devices sit at privileged positions within enterprise environments. Compromising a core switch gives attackers visibility into traffic flows, the ability to modify routing, and a pivot point for lateral movement that's difficult to detect with endpoint-focused security tools.
For defenders managing HPE Aruba infrastructure, treat this as an emergency patch cycle. The combination of unauthenticated access, critical severity, and potential for full device takeover leaves no room for delay.
Related Articles
Cisco Patches Dual 9.8 CVSS Flaws in IMC and SSM On-Prem
CVE-2026-20093 and CVE-2026-20160 let unauthenticated attackers take full control of Cisco UCS servers and licensing infrastructure. No workarounds exist.
Apr 6, 2026OpenClaw Bootstrap Replay Bug Enables Admin Takeover (CVE-2026-32987)
Critical CVSS 9.8 flaw in OpenClaw AI agent platform lets attackers replay setup codes for privilege escalation. Patch to version 2026.3.13 immediately.
Mar 30, 2026Ubiquiti UniFi Flaw Scores CVSS 10—Patch Before Full Takeover
CVE-2026-22557 lets unauthenticated attackers traverse paths and hijack UniFi Network accounts. CVSS 10.0 severity demands immediate patching to 10.1.89.
Mar 27, 2026TP-Link Archer Routers Vulnerable to Unauthenticated Takeover
Critical CVE-2025-15517 allows attackers to bypass authentication on TP-Link Archer NX routers, upload malicious firmware, and modify configurations without credentials.
Mar 26, 2026