Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1020 CNY

100%

Hewlett Packard Enterprise (HPE) — Vulnerabilities & Security Advisories 450

Browse all 450 CVE security advisories affecting Hewlett Packard Enterprise (HPE). AI-powered Chinese analysis, POCs, and references for each vulnerability.

Hewlett Packard Enterprise (HPE) operates as a critical infrastructure provider, designing and selling servers, storage, networking hardware, and associated software solutions for enterprise data centers. With 418 recorded CVEs, the company’s attack surface primarily involves its managed services and hardware management interfaces. Historically, common vulnerability classes include remote code execution (RCE) and cross-site scripting (XSS), often stemming from web-based management consoles like HPE OneView or iLO. Privilege escalation flaws also appear frequently, allowing unauthorized users to gain administrative control over managed devices. Notable incidents have included credential exposure and insecure default configurations in firmware updates, which attackers exploited to pivot into internal networks. These weaknesses highlight the risks inherent in complex, interconnected enterprise ecosystems where management planes are often targeted. The high volume of vulnerabilities underscores the necessity for rigorous patch management and strict access controls across HPE’s extensive product portfolio to mitigate potential systemic breaches.

Top products by Hewlett Packard Enterprise (HPE): Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central ArubaOS (AOS) Aruba ClearPass Policy Manager HPE Aruba Networking Wireless Operating System (AOS) EdgeConnect SD-WAN Orchestrator Aruba EdgeConnect Enterprise Software AOS-8 Instant and AOS-10 AP Aruba Access Points running InstantOS and ArubaOS 10 Aruba Access Points: 100 Series; 103 Series; 110 Series; 120 Series; 130 Series; 200 Series; 207 Series; 210 Series; 220 Series; 260 Series; 300 Series; 303 Series; 310 Series; 318 Series Hardened Access Points; 320 Series; 330 Series; 340 Series; 370 Series; 500 Series; 510 Series; 530 Series; 550 Series; 630 Series; 650 Series; Aruba EdgeConnect Enterprise Orchestration Software HPE OneView HPE Aruba Networking ClearPass Policy Manager AOS-CX HPE Aruba Networking EdgeConnect SD-WAN Gateway HPE Athonet Core HPE StoreOnce Software HPE 3PAR Service Processor ArubaOS Wi-Fi Controllers and Campus/Remote Access Points Aruba OS HPE Aruba Networking Access Points, Instant AOS-8, and AOS-10 HPE Aruba Networking AOS HPE 3PAR StoreServ Management and Core Software Media HPE Aruba Networking EdgeConnect SD-WAN HPE Aruba Networking Fabric Composer (AFC) HPE Aruba Networking Private 5G Core HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 HPE Aruba Networking AOS-CX HPE Insight Remote Support HPE Aruba Networking Wireless Operating System (AOS-10 & AOS-8) ClearPass Policy Manager (CPPM)
CVE IDTitleCVSSSeverityPublished
CVE-2023-22774 Authenticated Path Traversal in ArubaOS Command Line Interface Allows for Arbitrary File Deletion. — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22773 Authenticated Path Traversal in ArubaOS Command Line Interface Allows for Arbitrary File Deletion. — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22772 Authenticated Path Traversal in ArubaOS Web-based Management Interface Allows for Arbitrary File Deletion — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 6.5 Medium2023-02-28
CVE-2023-22771 Insufficient Session Expiration in ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 6.8 Medium2023-02-28
CVE-2023-22770 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22769 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22768 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22767 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22766 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22765 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22764 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22763 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22762 Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22761 Authenticated Remote Command Execution in ArubaOS Web-based Management Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22760 Authenticated Remote Command Execution in ArubaOS Web-based Management Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22759 Authenticated Remote Command Execution in ArubaOS Web-based Management Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22758 Authenticated Remote Command Execution in ArubaOS Web-based Management Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 7.2 High2023-02-28
CVE-2023-22757 Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 8.1 High2023-02-28
CVE-2023-22756 Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 8.1 High2023-02-28
CVE-2023-22755 Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 8.1 High2023-02-28
CVE-2023-22754 Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 8.1 High2023-02-28
CVE-2023-22753 Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 8.1 High2023-02-28
CVE-2023-22752 Unauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 9.8 Critical2023-02-28
CVE-2023-22751 Unauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 9.8 Critical2023-02-28
CVE-2023-22750 Multiple Unauthenticated Command Injections in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 9.8 Critical2023-02-28
CVE-2023-22749 Multiple Unauthenticated Command Injections in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 9.8 Critical2023-02-28
CVE-2023-22748 Multiple Unauthenticated Command Injections in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 9.8 Critical2023-02-28
CVE-2023-22747 Multiple Unauthenticated Command Injections in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central 9.8 Critical2023-02-28
CVE-2022-37938 HPE Serviceguard 代码问题漏洞 — HPE Serviceguard for Linux 9.8 -2023-02-22
CVE-2022-37937 HPE Serviceguard 缓冲区错误漏洞 — HPE Serviceguard for Linux 9.8 -2023-02-22

This page lists every published CVE security advisory associated with Hewlett Packard Enterprise (HPE). Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.