A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.
PUBLISHED5.2
Unauthenticated Remote Code Execution via Heap Buffer Overflow in Network Management Service
Affected products
Hewlett Packard Enterprise (HPE)
HPE Aruba Networking Wireless Operating System (AOS)
<= 8.13.1.1 - AFFECTED
<= 8.12.0.6 - AFFECTED
<= 8.10.0.21 - AFFECTED
10.8.0.0 - AFFECTED
<= 10.7.2.2 - AFFECTED
<= 10.4.1.10 - AFFECTED
References
GitHub Security Advisories
GHSA-jr3f-xhmv-xm9q
A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and...
https://github.com/advisories/GHSA-jr3f-xhmv-xm9qA heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-23827Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-23827",
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"dateUpdated": "2026-05-12T18:54:47.364Z",
"dateReserved": "2026-01-16T15:22:49.225Z",
"datePublished": "2026-05-12T18:54:47.364Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe",
"dateUpdated": "2026-05-12T18:54:47.364Z"
},
"title": "Unauthenticated Remote Code Execution via Heap Buffer Overflow in Network Management Service",
"descriptions": [
{
"lang": "en",
"value": "A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.</p>"
}
]
}
],
"affected": [
{
"vendor": "Hewlett Packard Enterprise (HPE)",
"product": "HPE Aruba Networking Wireless Operating System (AOS)",
"defaultStatus": "affected",
"versions": [
{
"version": "8.13.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.13.1.1"
},
{
"version": "8.12.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.12.0.6"
},
{
"version": "8.10.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.10.0.21"
},
{
"version": "10.8.0.0",
"status": "affected",
"versionType": "semver"
},
{
"version": "10.7.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "10.7.2.2"
},
{
"version": "10.4.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "10.4.1.10"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "n3k",
"type": "reporter"
}
]
}
}
}