Description
A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploitation may redirect an authenticated user to an attacker-controlled server hosting a spoofed login page prompting the unsuspecting victim to give away their credentials, which could then be captured by the attacker, before being redirected back to the legitimate login page.
Published: 2026-04-07
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Credential theft via phishing
Action: Patch
AI Analysis

Impact

This flaw resides in the graphical interface of the HPE Aruba Private 5G Core on‑prem product. An attacker can craft a URL that hijacks the login flow and forces an authenticated user to be redirected to a malicious, attacker‑controlled address that serves a counterfeit login page. The victim may then unknowingly enter their credentials, which the attacker captures before returning them to the legitimate site. This results in potential compromise of user accounts and downstream services.

Affected Systems

The vulnerability affects the HPE Aruba Networking Private 5G Core on‑prem GUI in all deployed versions of the product. Specific version information is not provided, so all installations should be treated as potentially vulnerable until a patch is applied.

Risk and Exploitability

The CVSS score of 8.8 indicates a high-impact flaw. An attacker only needs to supply a crafted link—such as via phishing email or embedded in a malicious site—to trigger the redirect. The requirement for an authenticated user reduces the immediate exploitation window, yet once a user is lured, credential compromise is likely. EPSS data is unavailable and the issue is not listed in KEV, suggesting no confirmed widespread exploitation yet, but the high severity and credential theft possibility make this a critical concern.

Generated by OpenCVE AI on April 7, 2026 at 19:40 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest security patch or update released by HPE for the affected Private 5G Core component as documented in the HPE support advisory
  • Disable or restrict arbitrary redirects in the login flow, limiting allowed target URLs to trusted domains
  • Enable multi‑factor authentication for all user accounts to mitigate the impact of stolen credentials

Generated by OpenCVE AI on April 7, 2026 at 19:40 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 14 Apr 2026 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Hpe aruba Networking Private 5g Core
CPEs cpe:2.3:a:hpe:aruba_networking_private_5g_core:*:*:*:*:*:*:*:*
Vendors & Products Hpe aruba Networking Private 5g Core

Wed, 08 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Hpe
Hpe private 5g Core
Vendors & Products Hpe
Hpe private 5g Core

Tue, 07 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
Description A vulnerability has been identified in the graphical user interface (GUI) of HPE Aruba Networking Private 5G Core On-Prem that could allow an attacker to abuse an open redirect vulnerability in the login flow using a crafted URL. Successful exploitation may redirect an authenticated user to an attacker-controlled server hosting a spoofed login page prompting the unsuspecting victim to give away their credentials, which could then be captured by the attacker, before being redirected back to the legitimate login page.
Title Open Redirect Vulnerability in HPE Aruba Networking Private 5G Core On-Prem
Weaknesses CWE-601
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Hpe Aruba Networking Private 5g Core Private 5g Core
cve-icon MITRE

Status: PUBLISHED

Assigner: hpe

Published:

Updated: 2026-04-07T13:17:32.192Z

Reserved: 2026-01-16T15:22:49.223Z

Link: CVE-2026-23818

cve-icon Vulnrichment

Updated: 2026-04-07T13:17:23.520Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-07T13:16:45.587

Modified: 2026-04-14T21:15:02.650

Link: CVE-2026-23818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-08T19:49:44Z

Weaknesses