An authenticated remote code execution vulnerability exists in the AOS-8 and AOS-10 web-based management interface. A vulnerability in the certificate download functionality could allow an authenticated remote attacker to overwrite arbitrary files on the underlying operating system by exploiting improper input validation in the file path parameter. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system as a privileged user.
PUBLISHED5.2
Authenticated Remote Code Execution via Arbitrary File Overwrite in the AOS-8 and AOS-10 Web-Based Management Interface
Affected products
Hewlett Packard Enterprise (HPE)
HPE Aruba Networking Wireless Operating System (AOS)
<= 8.13.1.1 - AFFECTED
<= 8.12.0.6 - AFFECTED
<= 8.10.0.21 - AFFECTED
10.8.0.0 - AFFECTED
<= 10.7.2.2 - AFFECTED
<= 10.4.1.10 - AFFECTED
References
GitHub Security Advisories
GHSA-5wfp-54cp-mj7h
An authenticated remote code execution vulnerability exists in the AOS-8 and AOS-10 web-based...
https://github.com/advisories/GHSA-5wfp-54cp-mj7hAn authenticated remote code execution vulnerability exists in the AOS-8 and AOS-10 web-based management interface. A vulnerability in the certificate download functionality could allow an authenticated remote attacker to overwrite arbitrary files on the underlying operating system by exploiting improper input validation in the file path parameter. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system as a privileged user.
JSON source
https://cveawg.mitre.org/api/cve/CVE-2026-44852Click to expand
{
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"cveMetadata": {
"cveId": "CVE-2026-44852",
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"dateUpdated": "2026-05-12T18:55:53.008Z",
"dateReserved": "2026-05-07T21:29:03.734Z",
"datePublished": "2026-05-12T18:55:53.008Z",
"state": "PUBLISHED"
},
"containers": {
"cna": {
"providerMetadata": {
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe",
"dateUpdated": "2026-05-12T18:55:53.008Z"
},
"title": "Authenticated Remote Code Execution via Arbitrary File Overwrite in the AOS-8 and AOS-10 Web-Based Management Interface",
"descriptions": [
{
"lang": "en",
"value": "An authenticated remote code execution vulnerability exists in the AOS-8 and AOS-10 web-based management interface. A vulnerability in the certificate download functionality could allow an authenticated remote attacker to overwrite arbitrary files on the underlying operating system by exploiting improper input validation in the file path parameter. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system as a privileged user.",
"supportingMedia": [
{
"type": "text/html",
"base64": false,
"value": "<p>An authenticated remote code execution vulnerability exists in the AOS-8 and AOS-10 web-based management interface. A vulnerability in the certificate download functionality could allow an authenticated remote attacker to overwrite arbitrary files on the underlying operating system by exploiting improper input validation in the file path parameter. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system as a privileged user.</p>"
}
]
}
],
"affected": [
{
"vendor": "Hewlett Packard Enterprise (HPE)",
"product": "HPE Aruba Networking Wireless Operating System (AOS)",
"defaultStatus": "affected",
"versions": [
{
"version": "8.13.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.13.1.1"
},
{
"version": "8.12.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.12.0.6"
},
{
"version": "8.10.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "8.10.0.21"
},
{
"version": "10.8.0.0",
"status": "affected",
"versionType": "semver"
},
{
"version": "10.7.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "10.7.2.2"
},
{
"version": "10.4.0.0",
"status": "affected",
"versionType": "semver",
"lessThanOrEqual": "10.4.1.10"
}
]
}
],
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US"
}
],
"metrics": [
{
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
],
"cvssV3_1": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH",
"baseScore": 7.2,
"baseSeverity": "HIGH"
}
}
],
"credits": [
{
"lang": "en",
"value": "zzcentury",
"type": "reporter"
}
]
}
}
}