By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
Viral Trending contentViral Trending content
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
Reading: HPE warns of hardcoded passwords in Aruba access points
Notification Show More
Viral Trending contentViral Trending content
  • Home
  • Categories
    • World News
    • Politics
    • Sports
    • Celebrity
    • Business
    • Crypto
    • Tech News
    • Gaming News
    • Travel
  • Bookmarks
© 2024 All Rights reserved | Powered by Viraltrendingcontent
Viral Trending content > Blog > Tech News > HPE warns of hardcoded passwords in Aruba access points
Tech News

HPE warns of hardcoded passwords in Aruba access points

By admin 3 Min Read
Share
SHARE

Hewlett-Packard Enterprise (HPE) is warning of hardcoded credentials in Aruba Instant On Access Points that allow attackers to bypass normal device authentication and access the web interface.

Aruba Instant On Access Points are compact, plug-and-play wireless (Wi-Fi) devices, designed primarily for small to medium-sized businesses, offering enterprise-grade features (guest networks, traffic segmentation) with cloud/mobile app management.

The security issue, tracked as CVE-2025-37103 and rated “critical” (CVSS v3.1 score: 9.8), impacts Instant On Access Points running firmware version 3.2.0.1 and below.

“Hardcoded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication,” explained HPE in the bulletin.

“Successful exploitation could allow a remote attacker to gain administrative access to the system.”

As the administrative credentials are hardcoded in the firmware, discovering them is trivial for knowledgeable actors.

By accessing the web interface as administrators, attackers may change the access point’s settings, reconfigure security, install backdoors, perform stealthy surveillance by capturing traffic, or even attempt lateral movement.

The vulnerability was discovered by a Ubisectech Sirius Team security researcher using the alias ZZ, who reported it directly to the vendor.

Users of vulnerable devices are recommended to upgrade to firmware version 3.2.1.0 or newer to address the risk. HPE has given no workarounds, so patching is the recommended course of action.

It is clarified in the bulletin that CVE-2025-37103 does not impact Instant On Switches.

On the same bulletin, HPE highlights a second vulnerability, CVE-2025-37102. This is a high-severity authenticated command injection flaw in the Command Line Interface (CLI) of Aruba Instant On access points.

This flaw can be chained with CVE-2025-37103, as admin access is required for its exploitation, allowing threat actors to inject arbitrary commands into the CLI for data exfiltration, security disabling, and establishing persistence.

In this case, too, the problem is resolved by upgrading to firmware version 3.2.1.0 or later, and no workaround is available.

At this time, HPE Aruba Networking is not aware of any reports of exploitation of the two flaws. However, this could change quickly, so applying the security updates immediately is crucial.

Wiz

Contain emerging threats in real time – before they impact your business.

Learn how cloud detection and response (CDR) gives security teams the edge they need in this practical, no-nonsense guide.

You Might Also Like

Samsung Tri-fold Foldable Named and Dated

AI’s Next Evolution: From Advisor to Architect – New TCS/MIT SMR Study Reveals Game-Changing Shift

9 Best Coolers WIRED Tested for Every Budget, Any Situation

Astronomers observe the earliest moments of a new solar system

EncryptHub Targets Web3 Developers Using Fake AI Platforms to Deploy Fickle Stealer Malware

TAGGED: Access Point, Firmware, Hardcoded Password, Hardware, HPE, Networking, Vulnerability
Share This Article
Facebook Twitter Copy Link
Previous Article How Chelsea’s global marketing push is taking the club beyond football
Next Article How Cloudflare DNS Outage Took Out The Internet
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

- Advertisement -
Ad image

Latest News

Littler fuelled for World Matchplay by 'hours and hours' of practice
Sports
Assassin’s Creed Shadows’ Development Budget Exceeded €100 Million
Gaming News
Asian shares, yen weather Japan uncertainty as earnings loom
Business
Samsung Tri-fold Foldable Named and Dated
Tech News
Ether preps record short squeeze as analysis sees $4K ETH price ‘soon’
Crypto
Ubisoft Shareholder Confronts Boss About 'Woke' Assassin's Creed
Gaming News
Low P/E ratios, yields up to 9%! Are these the FTSE 250’s best value stocks?
Business

About Us

Welcome to Viraltrendingcontent, your go-to source for the latest updates on world news, politics, sports, celebrity, tech, travel, gaming, crypto news, and business news. We are dedicated to providing you with accurate, timely, and engaging content from around the globe.

Quick Links

  • Home
  • World News
  • Politics
  • Celebrity
  • Business
  • Home
  • World News
  • Politics
  • Sports
  • Celebrity
  • Business
  • Crypto
  • Gaming News
  • Tech News
  • Travel
  • Sports
  • Crypto
  • Tech News
  • Gaming News
  • Travel

Trending News

cageside seats

Unlocking the Ultimate WWE Experience: Cageside Seats News 2024

Littler fuelled for World Matchplay by 'hours and hours' of practice

Investing £5 a day could help me build a second income of £329 a month!

cageside seats
Unlocking the Ultimate WWE Experience: Cageside Seats News 2024
May 22, 2024
Littler fuelled for World Matchplay by 'hours and hours' of practice
July 21, 2025
Investing £5 a day could help me build a second income of £329 a month!
March 27, 2024
Brussels unveils plans for a European Degree but struggles to explain why
March 27, 2024
© 2024 All Rights reserved | Powered by Vraltrendingcontent
  • About Us
  • Contact US
  • Disclaimer
  • Privacy Policy
  • Terms of Service
Welcome Back!

Sign in to your account

Lost your password?