Impact
Key detail from description: "A vulnerability in the command parameters of a certain AOS‑CX CLI command could allow a low‑privilege authenticated remote attacker to inject malicious commands resulting in unwanted behavior." The vulnerability is a classic command injection (CWE‑77) that allows an authenticated user to supply crafted parameters that are executed by the system. When exploited, this can lead to arbitrary code execution, privilege escalation, and complete compromise of the device, affecting confidentiality, integrity and availability.
Affected Systems
Affected product is Hewlett Packard Enterprise (HPE) AOS‑CX. The entry does not list specific vulnerable versions; therefore, any HPE AOS‑CX installations may be impacted until confirmed otherwise. The vendor support article (https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05027en_us&docLocale=en_US) should be consulted for version applicability.
Risk and Exploitability
The CVSS score of 8.8 indicates high severity. EPSS is below 1%, suggesting low probability of exploitation in the wild, and the vulnerability is not listed in the CISA KEV catalog. However, only low‑privilege authenticated CLI access is required, a condition commonly obtainable for attackers with network access to the device. The attack vector is remote; a successful exploitation would enable execution of arbitrary system commands.
OpenCVE Enrichment