HPE Warns of Critical AOS-CX Vulnerability Allowing Admin Password Resets

Related

Cybersecurity Leaders to Watch in Florida’s Higher Education Sector

Florida’s higher education institutions operate complex digital environments that...

HPE Warns of Critical AOS-CX Vulnerability Allowing Admin Password Resets

What happened Hewlett Packard Enterprise (HPE) warned that a critical...

CISA Shortens Patch Deadline for Critical Ivanti and SolarWinds Vulnerabilities

What happened The Cybersecurity and Infrastructure Security Agency (CISA) shortened...

Share

What happened

Hewlett Packard Enterprise (HPE) warned that a critical vulnerability in Aruba AOS-CX network operating systems allows attackers with low-level access to reset administrator passwords and take over affected switches. The flaw, tracked as CVE-2025-37103, affects multiple AOS-CX versions and stems from insecure permission controls in a service manager component. According to HPE, exploitation lets an authenticated attacker with manager-level privileges trigger a password reset for the built-in administrator account, potentially gaining full control of the device. The company released patches and mitigation guidance for affected versions, and assigned the issue a CVSS score of 9.8.

Who is affected

Organizations running vulnerable versions of Aruba AOS-CX on supported switching platforms are affected, particularly environments where attackers could already obtain authenticated access with lower-level privileges.

Why CISOs should care

The vulnerability affects core network infrastructure, where unauthorized administrator password resets could lead to device takeover, configuration tampering, and broader compromise of enterprise network environments.

3 practical actions

  1. Apply HPE security updates. Install the fixed AOS-CX versions released by HPE to remediate CVE-2025-37103.
  2. Review privileged access on switches. Audit existing authenticated accounts and reduce unnecessary manager-level access.
  3. Monitor switch administration events. Detect unexpected password reset activity or unauthorized configuration changes on affected devices.

For more reporting on newly disclosed software and infrastructure flaws, explore our latest coverage in the Vulnerabilities category.