Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Last Call: Tonight disrupt 2025 ticket savings end

    August 6, 2025

    Bitcoin is due to corporate treasury being “ankid”

    August 6, 2025

    I tried the first 360-degree camera of DJI, and its recording capabilities take out the competition.

    August 6, 2025
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»HPE Aruba Access Password Warns of Hardcoded Password in Access Points
    Security

    HPE Aruba Access Password Warns of Hardcoded Password in Access Points

    PineapplesUpdateBy PineapplesUpdateJuly 20, 2025No Comments2 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    HPE Aruba Access Password Warns of Hardcoded Password in Access Points
    Share
    Facebook Twitter LinkedIn Pinterest Email

    HPE Aruba Access Password Warns of Hardcoded Password in Access Points

    Hewlett-Packard Enterprise (HPE) is warning of hardcoded credentials at Aruba Instant on access points that allow the attackers to bypass the general device authentication and reach the web interfaces.

    Access points have Aruba Instant Compact, Plug-Plug Wireless (Wi-Fi) devices, mainly designed for small-to-medium-sized businesses, which offer enterprise-grade features (guest network, traffic segmentation) with cloud/mobile app management.

    The safety issue tracked as CVE-2025-37103 and “Critical” (CVSS V3.1 Score: 9.8) was evaluated, which immediately affects the firmware version of 3.2.0.1 and below the access points.

    “Hardcoded login credentials were found in HPE networking institutes on access points, allowing anyone to bypass normal device authentication,” HPE explained in bulletin,

    “Successful exploitation may allow a remote attacker to achieve administrative access to the system.”

    Since the firmware has administrative credentials hardcode, despised to the knowledgeable actors to find them.

    By reaching the web interface as an administrator, attackers can change the settings of the access points, configure security, install backdoor, keep the traffic and monitor secretly, or even attempts the lateral movement.

    The vulnerability was discovered using a Ubisectech Sirius team security researcher using aka Zz, who reported it directly to the seller.

    Users of weak equipment are recommended to upgrade firmware version 3.2.1.0 or new to address the risk. HPE has not given any workaround, so patching is a recommended course of action.

    It is clarified in the bulletin that CVE-2025-37103 does not affect immediately on the switch.

    On the same bulletin, HPE highlights a second vulnerability, cve-2025–37102. It is a high-seriousness certified command injection flour at the command line interface (CLI) of the Aruba Instant on Access Points.

    This defect can be chained with CVE-2025–37103, as its exploitation requires administrator access, which allows danger actors to inject arbitrary command in CLI to disable data exfoliation, security, disable and establish firmness.

    In this case, also, the problem is solved by upgrading the firmware version 3.2.1.0 or later, and no workaround is available.

    At this time, HPE Aruba Networking is not aware of any report of exploitation of two flaws. However, it can change quickly, so it is important to implement the security updates immediately.


    Knowledgeable

    Include emerging hazards in real time – before they affect your business.

    Learn how cloud detection and response (CDR) gives security teams the required edge in this practical, no-nonsense guide.

    access Aruba Hardcoded HPE password points warns
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDo not click on that small link until you have sure.
    Next Article Powerful animal blender lives in its name, and it has also made me a Kail Smuthi fan
    PineapplesUpdate
    • Website

    Related Posts

    Security

    Last Call: Tonight disrupt 2025 ticket savings end

    August 6, 2025
    Security

    Let the Revolt Falls Hackers bypass Windows Login on Dell Laptop

    August 6, 2025
    Security

    How are cyber security leaders AI Infrastructure

    August 6, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    Last Call: Tonight disrupt 2025 ticket savings end

    August 6, 2025

    Bitcoin is due to corporate treasury being “ankid”

    August 6, 2025

    I tried the first 360-degree camera of DJI, and its recording capabilities take out the competition.

    August 6, 2025

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2025 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.