Ce mail provient de l'extérieur, restons vigilants

=====================================================================

                            CERT-Renater

                Note d'Information No. 2025/VULN464
_____________________________________________________________________

DATE                : 23/07/2025

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running HPE Networking Instant On software
                          versions prior to 3.2.1.0.

=====================================================================
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US
_____________________________________________________________________

HPESBNW04894 rev.1 - HPE Networking Instant On Access Points, Multiple
Vulnerabilities
Document Subtype: Security Bulletin|Document ID: hpesbnw04894en_us|Last
Updated: 2025-07-17|Release Date: 2025-07-08|Document Version: 1


Potential Security Impact: Remote: Access Restriction Bypass, Arbitrary
Code Execution


Source: Hewlett Packard Enterprise, HPE Product Security Response Team
VULNERABILITY SUMMARY


Title

HPE Networking Instant On Access Point Multiple Vulnerabilities

Note: A signed text copy of this document exists at hpe_aruba_networking_-_hpesbnw04894.txt

Note: A CSAF version of this document exists at hpe_aruba_networking_-_hpesbnw04894.json


Overview

HPE Aruba Networking has released a software patch for HPE Networking
Instant On Access Points that address multiple security vulnerabilities.


Affected Products

HPE Networking Instant On Access Points running software version

    3.2.0.1 and below


Unaffected Products

    HPE Networking Instant On Switches

    Any other supported HPE Aruba Networking products and supported
software versions that are not listed under the Affected Products
section of this advisory


Details

Hardcoded Credential Exposure Allows Unauthorized Access in Web
Interface (CVE-2025-37103)

Hardcoded login credentials were found in HPE Networking Instant On
Access Points, allowing anyone with knowledge of it to bypass normal
device authentication. Successful exploitation could allow a remote
attacker to gain administrative access to the system.

Internal Reference: ATLWL-566, ATLWL-562
Severity: Critical
CVSS v3.1 Base Score: 9.8
CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Discovery: This vulnerability was discovered and reported by ZZ from
Ubisectech Sirius Team through HPE Aruba Networking's Bug Bounty
program

Workaround: None


Authenticated Command Injection Vulnerability In Instant On Command
Line Interface (CVE-2025-37102)

An authenticated command injection vulnerability exists in the command
line interface of HPE Networking Instant On Access Points. A
successful exploitation could allow a remote attacker with elevated
privileges to execute arbitrary commands on the underlying operating
system as a highly privileged user.

Internal References: ATLWL-561
Severity: High
CVSS v3.1 Base Score: 7.2
CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Discovery: This vulnerability was discovered and reported by ZZ from
Ubisectech Sirius Team through HPE Aruba Networking's Bug Bounty
program

Workaround: None


Workaround and Mitigations

Vulnerability specific workarounds are listed per vulnerability above.
You may contact HPE Services - Aruba Networking for assistance if
needed.

Exploitation and Public Discussion

HPE Aruba Networking is not aware of any public discussion or exploit
code targeting these specific vulnerabilities as of the release date
of the advisory.


References:

    CVE-2025-37103
    CVE-2025-37102

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

HPE Networking Instant On Access Points AP11 Please refer to Affected
Products sections within Vulnerability Summary of Security Bulletin
for more information


BACKGROUND
HPE calculates CVSS using CVSS Version 3.1. If the score is provided
from NIST, we will display Version 3.1 as provided from NVD.


Reference                  V3 Vector                   V3 Base Score

CVE-2025-37102   CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H   7.2
CVE-2025-37103   CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H   9.8


Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002

See details below under the vulnerability summary for
acknowledgement of individual reports


RESOLUTION

Resolution

Upgrade to HPE Networking Instant On software version 3.2.1.0 and above.

Please note that Instant On devices started updating automatically during
the week of June 30, 2025. No action is required from customers for this
to occur, but manual upgrades may be triggered via the Instant On app or
web portal after the release date.

Note: These vulnerabilities only affect HPE Networking Instant On Access
Points. HPE Networking Instant On Switches are not affected.

HPE Aruba Networking does not evaluate or patch software branches that
have reached their End of Support Life (EoSL) milestone.

For more information about HPE Aruba Networking products End of Support
policy visit: https://www.hpe.com/psnow/doc/a00143052enw

HISTORY
Version:1 (rev.1) - 17 July 2025 Initial release

Third Party Security Patches: Third party security patches that are to
be installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch
management policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues
about the content of this Security Bulletin, send e-mail to
security-alert@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:

    Web Form: https://www.hpe.com/info/report-security-vulnerability

    Email: security-alert@hpe.com

    Hewlett Packard Enterprise Product Security Response Policy:
https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00100637en_us


Subscribe: To initiate a subscription to receive future HPE Security
Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security
Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive

System management and security procedures must be reviewed frequently
to maintain system integrity. HPE is continually reviewing and enhancing
the security features of software products to provide customers with
current secure solutions.

"HPE is broadly distributing this Security Bulletin in order to bring
to the attention of users of the affected HPE products the important
security information contained in this Bulletin. HPE recommends that
all users determine the applicability of this information to their
individual situations and take appropriate action. HPE does not
warrant that this information is necessarily accurate or complete
for all user situations and, consequently, HPE will not be responsible
for any damages resulting from user's use or disregard of the
information provided in this Bulletin. To the extent permitted by law,
HPE disclaims all warranties, either express or implied, including the
warranties of merchantability and fitness for a particular purpose,
title and non-infringement."

©Copyright 2025 Hewlett Packard Enterprise Development LP
Hewlett Packard Enterprise Development shall not be liable for technical
or editorial errors or omissions contained herein. The information
provided is provided "as is" without warranty of any kind. To the extent
permitted by law, neither HPE nor its affiliates, subcontractors or
suppliers will be liable for incidental, special or consequential damages
including downtime cost; lost profits; damages relating to the procurement
of substitute products or services; or damages for loss of data, or
software restoration. The information in this document is subject to
change without notice. Hewlett Packard Enterprise Development and the
names of Hewlett Packard Enterprise Development products referenced
herein are trademarks of Hewlett Packard Enterprise Development in the
United States and other countries. Other product and company names
mentioned herein may be trademarks of their respective owners.


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================
