Browse all 450 CVE security advisories affecting Hewlett Packard Enterprise (HPE). AI-powered Chinese analysis, POCs, and references for each vulnerability.
Hewlett Packard Enterprise (HPE) operates as a critical infrastructure provider, designing and selling servers, storage, networking hardware, and associated software solutions for enterprise data centers. With 418 recorded CVEs, the company’s attack surface primarily involves its managed services and hardware management interfaces. Historically, common vulnerability classes include remote code execution (RCE) and cross-site scripting (XSS), often stemming from web-based management consoles like HPE OneView or iLO. Privilege escalation flaws also appear frequently, allowing unauthorized users to gain administrative control over managed devices. Notable incidents have included credential exposure and insecure default configurations in firmware updates, which attackers exploited to pivot into internal networks. These weaknesses highlight the risks inherent in complex, interconnected enterprise ecosystems where management planes are often targeted. The high volume of vulnerabilities underscores the necessity for rigorous patch management and strict access controls across HPE’s extensive product portfolio to mitigate potential systemic breaches.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2023-22774 | Authenticated Path Traversal in ArubaOS Command Line Interface Allows for Arbitrary File Deletion. — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22773 | Authenticated Path Traversal in ArubaOS Command Line Interface Allows for Arbitrary File Deletion. — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22772 | Authenticated Path Traversal in ArubaOS Web-based Management Interface Allows for Arbitrary File Deletion — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 6.5 | Medium | 2023-02-28 |
| CVE-2023-22771 | Insufficient Session Expiration in ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 6.8 | Medium | 2023-02-28 |
| CVE-2023-22770 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22769 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22768 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22767 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22766 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22765 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22764 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22763 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22762 | Authenticated Remote Command Execution in the ArubaOS Command Line Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22761 | Authenticated Remote Command Execution in ArubaOS Web-based Management Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22760 | Authenticated Remote Command Execution in ArubaOS Web-based Management Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22759 | Authenticated Remote Command Execution in ArubaOS Web-based Management Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22758 | Authenticated Remote Command Execution in ArubaOS Web-based Management Interface — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 7.2 | High | 2023-02-28 |
| CVE-2023-22757 | Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 8.1 | High | 2023-02-28 |
| CVE-2023-22756 | Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 8.1 | High | 2023-02-28 |
| CVE-2023-22755 | Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 8.1 | High | 2023-02-28 |
| CVE-2023-22754 | Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 8.1 | High | 2023-02-28 |
| CVE-2023-22753 | Unauthenticated Buffer Overflow Vulnerabilities in ArubaOS Processes — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 8.1 | High | 2023-02-28 |
| CVE-2023-22752 | Unauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 9.8 | Critical | 2023-02-28 |
| CVE-2023-22751 | Unauthenticated Stack-Based Buffer Overflow Vulnerabilities in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 9.8 | Critical | 2023-02-28 |
| CVE-2023-22750 | Multiple Unauthenticated Command Injections in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 9.8 | Critical | 2023-02-28 |
| CVE-2023-22749 | Multiple Unauthenticated Command Injections in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 9.8 | Critical | 2023-02-28 |
| CVE-2023-22748 | Multiple Unauthenticated Command Injections in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 9.8 | Critical | 2023-02-28 |
| CVE-2023-22747 | Multiple Unauthenticated Command Injections in the PAPI Protocol — Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central | 9.8 | Critical | 2023-02-28 |
| CVE-2022-37938 | HPE Serviceguard 代码问题漏洞 — HPE Serviceguard for Linux | 9.8 | - | 2023-02-22 |
| CVE-2022-37937 | HPE Serviceguard 缓冲区错误漏洞 — HPE Serviceguard for Linux | 9.8 | - | 2023-02-22 |
This page lists every published CVE security advisory associated with Hewlett Packard Enterprise (HPE). Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.