Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23814: Vulnerability in Hewlett Packard Enterprise (HPE) AOS-CX

0
High
VulnerabilityCVE-2026-23814cvecve-2026-23814
Published: Wed Mar 11 2026 (03/11/2026, 03:11:34 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: AOS-CX

Description

CVE-2026-23814 is a high-severity vulnerability in Hewlett Packard Enterprise's AOS-CX network operating system. It involves improper handling of command parameters in a specific CLI command, allowing a low-privilege authenticated remote attacker to perform command injection. This can lead to full compromise of confidentiality, integrity, and availability of the affected device without requiring user interaction. The vulnerability affects multiple versions of AOS-CX, including 10. 10. 0000 through 10. 17. 0000. Although no known exploits are currently in the wild, the ease of exploitation and high impact make it a critical risk for organizations using HPE AOS-CX switches. Immediate patching or mitigation is recommended to prevent potential unauthorized control or disruption of network infrastructure.

AI-Powered Analysis

AILast updated: 03/11/2026, 04:14:41 UTC

Technical Analysis

CVE-2026-23814 is a command injection vulnerability found in Hewlett Packard Enterprise's AOS-CX network operating system, specifically within the command-line interface (CLI). The flaw arises from insufficient validation or sanitization of command parameters in a certain CLI command, which allows a low-privilege authenticated remote attacker to inject arbitrary commands. This injection can cause the device to execute unintended commands, potentially leading to unauthorized configuration changes, data leakage, or denial of service. The vulnerability affects multiple versions of AOS-CX, including 10.10.0000, 10.13.0000, 10.16.0000, and 10.17.0000. The CVSS v3.1 base score is 8.8, indicating high severity, with attack vector being network-based, low attack complexity, requiring low privileges but no user interaction, and impacting confidentiality, integrity, and availability. Although no public exploits have been reported yet, the vulnerability's characteristics suggest it could be exploited remotely by attackers with valid credentials, making it a significant threat to network infrastructure relying on these devices.

Potential Impact

The exploitation of CVE-2026-23814 can have severe consequences for organizations globally. Successful command injection could allow attackers to gain unauthorized control over network switches, leading to unauthorized access to sensitive network configurations and data. Attackers could disrupt network operations by altering routing, disabling services, or causing device crashes, resulting in denial of service. The compromise of network infrastructure devices can also serve as a foothold for further lateral movement within an organization's environment, escalating the overall risk. Given the critical role of HPE AOS-CX switches in enterprise and data center networks, this vulnerability could impact confidentiality, integrity, and availability of critical business systems, potentially causing operational downtime, data breaches, and financial losses.

Mitigation Recommendations

Organizations should immediately identify and inventory all HPE AOS-CX devices running affected versions (10.10.0000 through 10.17.0000). They should monitor HPE advisories for patches or updates addressing this vulnerability and apply them as soon as they become available. Until patches are deployed, restrict CLI access to trusted administrators only, preferably via secure management networks isolated from general user access. Implement strong authentication mechanisms and enforce the principle of least privilege to limit the number of users with CLI access. Network segmentation and monitoring for unusual CLI command activity can help detect and prevent exploitation attempts. Additionally, consider disabling or restricting the vulnerable CLI commands if feasible. Regularly audit device configurations and logs for signs of unauthorized changes or suspicious behavior. Finally, incorporate this vulnerability into incident response and threat hunting activities to ensure rapid detection and remediation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2026-01-16T15:22:38.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0e8b62f860ef943102168

Added to database: 3/11/2026, 3:59:50 AM

Last enriched: 3/11/2026, 4:14:41 AM

Last updated: 3/11/2026, 8:53:12 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses