CVE-2026-23827
Analyzed
Analyzed - Analysis Complete
BaseFortify
Publication date: 2026-05-12
Last updated on: 2026-05-15
Assigner: Hewlett Packard Enterprise (HPE)
Description
Description
A heap-based buffer overflow vulnerability exists in a Network management service of AOS-8 and AOS-10 that could allow an unauthenticated remote attacker to achieve remote code execution. Successful exploitation could allow an unauthenticated attacker to execute arbitrary code as a privileged user on the underlying operating system, potentially leading to a system compromise. Exploitation may also result in a denial-of-service (DoS) condition affecting the impacted system process.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| arubanetworks | arubaos | From 6.5.4.0 (inc) to 8.10.0.22 (exc) |
| arubanetworks | arubaos | From 8.11.0.0 (inc) to 8.12.0.7 (exc) |
| arubanetworks | arubaos | From 8.13.0.0 (inc) to 8.13.1.2 (exc) |
| arubanetworks | arubaos | From 10.4.0.0 (inc) to 10.4.1.11 (exc) |
| arubanetworks | arubaos | From 10.5.0.0 (inc) to 10.7.2.3 (exc) |
| arubanetworks | sd-wan | From 8.6.0.4-2.2.0.0 (inc) to 8.6.0.4-2.2.0.7 (inc) |
| arubanetworks | sd-wan | From 8.7.0.0-2.3.0.0 (inc) to 8.7.0.0-2.3.0.9 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70