CVE-2026-23821 PUBLISHED

Inconsistent input filtering allows Authenticated Command Injection in AOS-10 CLI

Assigner: hpe
Reserved: 16.01.2026 Published: 12.05.2026 Updated: 13.05.2026

A vulnerability in the configuration processing logic of Access Points running AOS-10 could allow an authenticated remote attacker to execute system commands under certain pre-existing conditions. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.

Note: Access Points running AOS-8 Instant software are not affected by this vulnerability.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.2

Product Status

Vendor Hewlett Packard Enterprise (HPE)
Product ArubaOS (AOS)
Versions Default: affected
  • Version 10.8.0.0 is affected
  • affected from 10.7.0.0 to 10.7.2.2 (incl.)
  • affected from 10.4.0.0 to 10.4.1.10 (incl.)

Credits

  • This vulnerability was discovered and reported by moonv through HPE Aruba Networking's Bug Bounty program reporter

References