Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23817: Vulnerability in Hewlett Packard Enterprise (HPE) AOS-CX

0
Medium
VulnerabilityCVE-2026-23817cvecve-2026-23817
Published: Wed Mar 11 2026 (03/11/2026, 03:14:18 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: AOS-CX

Description

CVE-2026-23817 is a medium-severity vulnerability affecting Hewlett Packard Enterprise (HPE) AOS-CX switches' web-based management interface. It allows an unauthenticated remote attacker to redirect users to arbitrary URLs, potentially facilitating phishing or other malicious activities. The vulnerability affects multiple AOS-CX versions including 10. 10. 0000 through 10. 17. 0000. Exploitation requires no privileges but does require user interaction to follow the redirect. There is no known exploit in the wild at this time. The vulnerability impacts the integrity of user sessions by enabling redirection attacks but does not affect confidentiality or availability directly.

AI-Powered Analysis

AILast updated: 03/11/2026, 04:15:08 UTC

Technical Analysis

CVE-2026-23817 is a vulnerability identified in the web-based management interface of Hewlett Packard Enterprise (HPE) AOS-CX switches, specifically affecting versions 10.10.0000, 10.13.0000, 10.16.0000, and 10.17.0000. The flaw allows an unauthenticated remote attacker to perform arbitrary URL redirection. This means an attacker can craft malicious links or responses that cause legitimate users accessing the management interface to be redirected to attacker-controlled or malicious websites. The vulnerability does not require any authentication, making it accessible to any remote actor who can reach the management interface. However, user interaction is necessary since the victim must follow the redirect for exploitation to succeed. The vulnerability impacts the integrity of the management interface sessions by enabling redirection attacks, which could be leveraged for phishing, social engineering, or further exploitation attempts. The CVSS v3.1 base score is 6.5, indicating a medium severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), unchanged scope (S:U), no confidentiality impact (C:N), high integrity impact (I:H), and no availability impact (A:N). There are no known exploits in the wild currently, and no patches have been linked yet. The vulnerability highlights the importance of securing web management interfaces against redirection and related attacks.

Potential Impact

The primary impact of CVE-2026-23817 is on the integrity of the HPE AOS-CX switch management interface sessions. By enabling arbitrary URL redirection, attackers can trick users into visiting malicious websites, potentially leading to phishing attacks, credential theft, or malware distribution. Although the vulnerability does not directly compromise confidentiality or availability, the indirect consequences of successful phishing or social engineering could lead to broader network compromise or data breaches. Organizations relying on HPE AOS-CX switches for critical network infrastructure may face increased risk of targeted attacks exploiting this vulnerability to gain footholds or disrupt operations. The ease of exploitation without authentication and the network-accessible nature of the management interface increase the threat surface. However, the requirement for user interaction limits automated exploitation. The absence of known exploits in the wild reduces immediate risk but does not eliminate the potential for future attacks. Overall, the vulnerability poses a moderate risk to organizations with exposed or poorly secured management interfaces, especially in sectors where network integrity is critical.

Mitigation Recommendations

To mitigate CVE-2026-23817, organizations should first ensure that access to the HPE AOS-CX web management interface is restricted to trusted networks and users only, ideally via network segmentation and firewall rules. Implementing VPN or jump hosts for management access can reduce exposure. Administrators should monitor HPE advisories closely for patches or updates addressing this vulnerability and apply them promptly once available. In the interim, consider disabling web-based management if feasible or limiting its use. Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) to detect and block suspicious redirection attempts targeting the management interface. User education is critical; train administrators to recognize and avoid suspicious links or unexpected redirects when accessing management consoles. Logging and monitoring of management interface access should be enhanced to detect anomalous activities. Additionally, enforcing strong authentication and multi-factor authentication (MFA) on management interfaces can reduce the risk of follow-on attacks if redirection is exploited. Regular security assessments and penetration testing of network management infrastructure can help identify and remediate related weaknesses.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2026-01-16T15:22:38.202Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b0e8b62f860ef943102171

Added to database: 3/11/2026, 3:59:50 AM

Last enriched: 3/11/2026, 4:15:08 AM

Last updated: 3/11/2026, 8:11:57 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses