Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
CVE Vulnerability Details :
CVE-2026-44858
PUBLISHED
More InfoOfficial Page
Assigner-hpe
Assigner Org ID-eb103674-0d28-4225-80f8-39fb86215de0
View Known Exploited Vulnerability (KEV) details
Published At-12 May, 2026 | 19:03
Updated At-12 May, 2026 | 19:03
Rejected At-
▼CVE Numbering Authority (CNA)
Authenticated Stack-Based Buffer Overflow in PAPI Services

Stack-based buffer overflow vulnerabilities exist in several underlying management service components accessed through the command-line interface of the AOS-8 and AOS-10 Operating Systems. An authenticated attacker with administrative privileges could exploit these vulnerabilities by sending specially crafted requests to the affected services. Successful exploitation could allow the attacker to execute arbitrary code with elevated privileges on the underlying operating system.

Affected Products
Vendor
Hewlett Packard Enterprise (HPE)Hewlett Packard Enterprise (HPE)
Product
HPE Aruba Networking Wireless Operating System (AOS)
Default Status
affected
Versions
Affected
  • From 8.13.0.0 through 8.13.1.1 (semver)
  • From 8.12.0.0 through 8.12.0.6 (semver)
  • From 8.10.0.0 through 8.10.0.21 (semver)
  • From 10.7.0.0 through 10.7.2.2 (semver)
  • 10.8.0.0 (semver)
  • From 10.4.0.0 through 10.4.1.10 (semver)
Metrics
VersionBase scoreBase severityVector
3.17.2HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 7.2
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

reporter
zzcentury
Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US
N/A
Hyperlink: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US
Resource: N/A
Details not found