Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23597: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking Private 5G Core

0
Medium
VulnerabilityCVE-2026-23597cvecve-2026-23597
Published: Tue Feb 17 2026 (02/17/2026, 20:46:45 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: HPE Aruba Networking Private 5G Core

Description

Vulnerabilities in the API error handling of an HPE Aruba Networking 5G Core server API could allow an unauthenticated remote attacker to obtain sensitive information. Successful exploitation could allow an attacker to access details such as user accounts, roles, and system configuration, as well as to gain insight into internal services and workflows, increasing the risk of unauthorized access and elevated privileges when combined with other vulnerabilities.

AI-Powered Analysis

AILast updated: 02/18/2026, 08:34:09 UTC

Technical Analysis

CVE-2026-23597 is a vulnerability identified in the Hewlett Packard Enterprise Aruba Networking Private 5G Core server API, specifically version 1.24.3.0. The vulnerability arises from improper error handling in the API, which allows an unauthenticated remote attacker to retrieve sensitive information. This includes details about user accounts, roles, system configuration, and internal service workflows. Although the vulnerability does not directly compromise confidentiality, integrity, or availability, the leaked information can be leveraged to facilitate unauthorized access or privilege escalation when combined with other security flaws. The vulnerability has a CVSS 3.1 base score of 6.5, categorized as medium severity, with attack vector requiring adjacent network access (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), and the impact is primarily on availability (A:H), indicating potential disruption. No known exploits are currently reported in the wild, and no official patches have been linked yet. The affected product, HPE Aruba Networking Private 5G Core, is a critical component in private 5G deployments used by enterprises and industrial sectors to manage 5G network functions and services. The vulnerability's exploitation could provide attackers with reconnaissance capabilities that increase the risk of further compromise. Given the growing adoption of private 5G networks in Europe, this vulnerability represents a significant risk vector for organizations deploying HPE's solution. The technical details emphasize the need for immediate risk assessment and implementation of compensating controls until a patch is available.

Potential Impact

For European organizations, the impact of CVE-2026-23597 is significant due to the increasing deployment of private 5G networks in sectors such as manufacturing, logistics, healthcare, and telecommunications. The vulnerability allows attackers to gain sensitive information about user roles and system configurations without authentication, which could be used to plan more sophisticated attacks, including privilege escalation and unauthorized access. This is particularly critical for industries relying on private 5G for operational technology (OT) and critical communications, where disruption or data leakage can have severe operational and safety consequences. The availability impact indicated by the CVSS score suggests potential denial-of-service conditions or service disruptions if the vulnerability is exploited in conjunction with other flaws. European organizations could face increased risks of espionage, sabotage, or data breaches, especially those with high-value targets or strategic importance in the 5G ecosystem. The lack of known exploits currently provides a window for proactive mitigation, but the risk of future exploitation remains. The vulnerability also poses reputational and compliance risks, as organizations must ensure the security of their 5G infrastructure under regulations such as GDPR and NIS Directive.

Mitigation Recommendations

1. Immediately restrict network access to the HPE Aruba Networking Private 5G Core API to trusted and authenticated internal networks only, using firewalls and access control lists (ACLs). 2. Implement strict network segmentation to isolate the 5G core infrastructure from general enterprise networks and the internet to reduce exposure. 3. Deploy continuous monitoring and anomaly detection systems focused on API traffic to identify unusual or unauthorized access attempts. 4. Conduct thorough audits of user roles and permissions within the 5G core environment to minimize privilege exposure. 5. Prepare for rapid deployment of official patches or updates from HPE once released, including testing in controlled environments. 6. Engage with HPE support and subscribe to security advisories to receive timely information on mitigation and patch availability. 7. Consider deploying additional security layers such as Web Application Firewalls (WAFs) or API gateways that can enforce stricter validation and error handling. 8. Train security teams on the specifics of private 5G core vulnerabilities and incident response procedures tailored to telecom infrastructure. 9. Review and update incident response plans to include scenarios involving 5G core infrastructure compromise. 10. Collaborate with telecom providers and industry groups to share threat intelligence related to private 5G core vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2026-01-14T15:40:17.991Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699575b980d747be2053755e

Added to database: 2/18/2026, 8:18:01 AM

Last enriched: 2/18/2026, 8:34:09 AM

Last updated: 2/21/2026, 12:19:28 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats