Description
A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.
Published: 2026-05-12
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a heap‑based buffer overflow in the Network Management Service of the Aruba AOS firmware. An unauthenticated attacker can send crafted data to the service, causing a memory corruption that allows arbitrary code execution with the privileges of the underlying operating system. The flaw also has the potential to trigger a denial‑of‑service by crashing the service. The weakness is a classic buffer overflow (CWE‑120).

Affected Systems

Affected products are Hewlett Packard Enterprise Aruba Networking Wireless Operating System (AOS) versions AOS‑8 and AOS‑10. The issue exists in the Network Management Service component of these firmware releases.

Risk and Exploitability

The CVSS base score of 7.5 indicates high severity. While the EPSS score is currently unavailable, the vulnerability permits remote code execution without authentication, and it is not listed in the CISA KEV catalog yet. The attack most likely originates from a remote source that can reach the management interface, making timely remediation critical.

Generated by OpenCVE AI on May 12, 2026 at 20:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest Aruba OS firmware patch referenced in HPE’s official support documentation (https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US).
  • Configure firewall or ACL rules to restrict access to the Network Management Service to only authorized IP ranges or a dedicated management VLAN, effectively blocking unauthenticated external traffic.
  • Continuously monitor system and firewall logs for suspicious activity targeting the management interface, and immediately investigate and block any unauthorized access attempts.

Generated by OpenCVE AI on May 12, 2026 at 20:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 21:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-120

Tue, 12 May 2026 19:30:00 +0000

Type Values Removed Values Added
Description A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.
Title Unauthenticated Remote Code Execution via Heap Buffer Overflow in Network Management Service
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: hpe

Published:

Updated: 2026-05-12T18:54:47.364Z

Reserved: 2026-01-16T15:22:49.225Z

Link: CVE-2026-23827

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-12T20:16:31.797

Modified: 2026-05-12T20:16:31.797

Link: CVE-2026-23827

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T20:45:23Z

Weaknesses