CVE-2026-23827 PUBLISHED

Unauthenticated Remote Code Execution via Heap Buffer Overflow in Network Management Service

Assigner: hpe
Reserved: 16.01.2026 Published: 12.05.2026 Updated: 12.05.2026

A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS Score: 7.5

Product Status

Vendor Hewlett Packard Enterprise (HPE)
Product HPE Aruba Networking Wireless Operating System (AOS)
Versions Default: affected
  • affected from 8.13.0.0 to 8.13.1.1 (incl.)
  • affected from 8.12.0.0 to 8.12.0.6 (incl.)
  • affected from 8.10.0.0 to 8.10.0.21 (incl.)
  • Version 10.8.0.0 is affected
  • affected from 10.7.0.0 to 10.7.2.2 (incl.)
  • affected from 10.4.0.0 to 10.4.1.10 (incl.)

Credits

  • n3k reporter

References