HPE Warns of Critical AOS-CX Vulnerability Allowing Admin Password Resets

Related

HPE Warns of Critical AOS-CX Vulnerability Allowing Admin Password Resets

What happened Hewlett Packard Enterprise (HPE) warned that a critical...

CISA Shortens Patch Deadline for Critical Ivanti and SolarWinds Vulnerabilities

What happened The Cybersecurity and Infrastructure Security Agency (CISA) shortened...

CISOs to Watch in Florida’s Information Technology Industry

Florida’s information technology sector includes cloud platforms, enterprise software...

Share

What happened

Hewlett Packard Enterprise (HPE) warned that a critical vulnerability in Aruba AOS-CX network operating systems allows attackers with low-level access to reset administrator passwords and take over affected switches. The flaw, tracked as CVE-2025-37103, affects multiple AOS-CX versions and stems from insecure permission controls in a service manager component. According to HPE, exploitation lets an authenticated attacker with manager-level privileges trigger a password reset for the built-in administrator account, potentially gaining full control of the device. The company released patches and mitigation guidance for affected versions, and assigned the issue a CVSS score of 9.8.

Who is affected

Organizations running vulnerable versions of Aruba AOS-CX on supported switching platforms are affected, particularly environments where attackers could already obtain authenticated access with lower-level privileges.

Why CISOs should care

The vulnerability affects core network infrastructure, where unauthorized administrator password resets could lead to device takeover, configuration tampering, and broader compromise of enterprise network environments.

3 practical actions

  1. Apply HPE security updates. Install the fixed AOS-CX versions released by HPE to remediate CVE-2025-37103.
  2. Review privileged access on switches. Audit existing authenticated accounts and reduce unnecessary manager-level access.
  3. Monitor switch administration events. Detect unexpected password reset activity or unauthorized configuration changes on affected devices.

For more reporting on newly disclosed software and infrastructure flaws, explore our latest coverage in the Vulnerabilities category.