HPE AOS-CX Switches Vulnerable to Admin Password Reset (CVSS 9.8)
CVE-2026-23813 allows unauthenticated attackers to reset admin passwords on HPE Aruba AOS-CX switches. No exploitation seen yet, but patch immediately.
Hewlett Packard Enterprise has disclosed a critical authentication bypass vulnerability in its Aruba AOS-CX switch operating system that could allow remote attackers to reset administrator passwords without credentials.
The flaw, tracked as CVE-2026-23813, carries a CVSS score of 9.8 and affects the web-based management interface across multiple AOS-CX switch families. Successful exploitation gives attackers full administrative control over enterprise network infrastructure—a worst-case scenario for any organization relying on these devices.
What's Vulnerable
The vulnerability exists in the web management interface of the following Aruba switch series:
- CX 4100i
- CX 6000, 6100, 6200, 6300, 6400
- CX 8320, 8325, 8360
- CX 9300
- CX 10000
The attack is low-complexity and requires no authentication. An attacker with network access to the management interface can simply craft a request that bypasses authentication controls and resets the administrator password. From there, they own the switch.
This vulnerability pattern—authentication bypass in network appliances—continues to plague enterprise equipment. We've seen similar issues across vendors this year, though few reach CVSS 9.8.
Three More Command Injection Flaws
HPE's security bulletin addresses four vulnerabilities total. Beyond the critical auth bypass, three high-severity command injection flaws affect the CLI:
- CVE-2026-23814 (CVSS 8.8): Authenticated remote attackers can inject commands via crafted CLI parameters
- CVE-2026-23815 (CVSS 7.2): Command injection in high-privilege CLI binaries
- CVE-2026-23816 (CVSS 7.2): Additional CLI command injection vector
A fifth issue, CVE-2026-23817 (CVSS 6.5), enables unauthenticated open redirects through the web interface.
The command injection flaws require authentication to exploit, but attackers who chain CVE-2026-23813 with any of these could achieve arbitrary code execution on compromised switches.
No Exploitation Yet—Patch Anyway
HPE states there's no evidence of active exploitation. But the severity score and attack simplicity make this a race against time once proof-of-concept code appears.
Security researcher "moonv" discovered the vulnerability and reported it through HPE's Aruba Networking Bug Bounty program.
Organizations should upgrade to patched AOS-CX versions immediately. The specific fixed versions vary by switch model—check HPE's security advisory for your hardware.
If patching isn't possible right now, HPE recommends these mitigations:
- Isolate management interfaces on dedicated VLANs
- Restrict management access to trusted hosts only
- Disable HTTP/HTTPS management interfaces where unnecessary
- Enforce access control lists for REST/HTTPS access
- Enable comprehensive logging and monitoring
The last point matters for detection. Organizations should monitor for unusual authentication attempts or password changes on network equipment, especially from unexpected source IPs.
Network Equipment Under Siege
This disclosure continues a pattern of critical vulnerabilities in network infrastructure. We covered Cisco SD-WAN flaws exploited by sophisticated threat actors earlier this month, and BeyondTrust's pre-auth RCE affecting over 11,000 exposed instances.
Network devices sit at privileged positions within enterprise environments. Compromising a core switch gives attackers visibility into traffic flows, the ability to modify routing, and a pivot point for lateral movement that's difficult to detect with endpoint-focused security tools.
For defenders managing HPE Aruba infrastructure, treat this as an emergency patch cycle. The combination of unauthenticated access, critical severity, and potential for full device takeover leaves no room for delay.
Related Articles
Ivanti EPM Auth Bypass Now Under Active Exploitation, CISA Warns
CVE-2026-1603 allows unauthenticated attackers to steal credential vaults from Ivanti Endpoint Manager. CISA added it to KEV catalog after exploitation detected.
Mar 11, 2026Caddy Server Flaw Lets Users Impersonate Admins
CVE-2026-30851 in Caddy's forward_auth module enables identity injection and privilege escalation. Any valid user can impersonate administrators. Update to 2.11.2.
Mar 8, 2026WeGIA Charity Management Platform Exposes Three Critical Flaws
CVE-2026-28408 and related vulnerabilities allow unauthenticated attackers to bypass security, inject data, and execute code on WeGIA servers. Patch to version 3.6.5 immediately.
Feb 28, 2026Vikunja Auth Flaw Lets Attackers Maintain Access After Password Reset
CVE-2026-27575 combines weak password enforcement with persistent sessions in Vikunja, enabling attackers to retain access even after victims change credentials.
Feb 27, 2026