Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
NWHStealer Uses Bun Loader, Anti-VM Delivery Chain
May 8, 2026
Mozilla Patches Firefox 0-Days Using Claude Mythos
May 8, 2026
Critical Spring Vulnerabilities Expose Arbitrary Files and GCP Secrets
May 8, 2026
Home/CyberSecurity News/Critical HPE Aruba Flaws Allow Unauthorized Access to Data
CyberSecurity News

Critical HPE Aruba Flaws Allow Unauthorized Access to Data

Hewlett Packard Enterprise (HPE) has disclosed four high-severity vulnerabilities affecting its Aruba Networking Instant On devices. If exploited, these flaws could grant attackers unauthorized...

David kimber
David kimber
January 15, 2026 2 Min Read
3 0

Hewlett Packard Enterprise (HPE) has disclosed four high-severity vulnerabilities affecting its Aruba Networking Instant On devices. If exploited, these flaws could grant attackers unauthorized access to sensitive network information and enable them to disrupt operations.

The security flaws, identified as CVE-2025-37165, CVE-2025-37166, CVE-2023-52340, and CVE-2022-48839, affect devices running software version 3.3.1.0 and earlier.

Vulnerability Details and Risk Assessment

The most critical vulnerability, CVE-2025-37165, exposes VLAN configuration details through unintended network interfaces when devices operate in router mode.

Attackers can inspect affected packets to learn about the internal network topology and configuration settings.

This information disclosure flaw carries a CVSS v3.1 score of 7.5 and requires no authentication to exploit.

CVE ID Description Severity CVSS Score Vector Attack Vector
CVE-2025-37165 VLAN information exposure in router mode High 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Network
CVE-2025-37166 DoS via crafted packets causing device shutdown High 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Network
CVE-2023-52340 Kernel packet processing memory corruption High 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H Network
CVE-2022-48839 IPv4/IPv6 packet handling vulnerability High 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H Local

CVE-2025-37166 enables denial-of-service attacks by sending specially crafted packets that force access points into a non-responsive state, potentially requiring physical hardware resets to restore functionality.

The vulnerability stems from improper packet processing mechanisms and shares the same 7.5 CVSS rating as the information disclosure flaw.

Two additional kernel-level vulnerabilities, CVE-2023-52340 and CVE-2022-48839, affect the underlying operating system’s handling of IPv4 and IPv6 packets.

These flaws could trigger memory corruption and system crashes, with CVSS scores of 7.5 and 5.5, respectively.

Affected Infrastructure and Exploitation Risk

The vulnerabilities specifically affect HPE Networking Instant on Access Points and Aruba Instant On 1930 Switch Series running firmware 3.3.1.0 or earlier.

HPE has confirmed that no other Aruba Networking products are affected by these security flaws.

Security researcher Daniel J Blueman of Quora.org discovered the VLAN exposure vulnerability. At the same time, Petr Chelmar of GreyCortex identified the denial-of-service flaw.

The kernel vulnerabilities were discovered internally by HPE’s Instant On engineering team during security audits.

HPE states it has no evidence of active exploitation in the wild as of the January 13, 2026, advisory publication date.

However, the network-accessible nature of three vulnerabilities and their low attack complexity significantly increases exploitation risk for unpatched devices exposed to internal or external networks.

HPE has released software version 3.3.2.0 that addresses all four vulnerabilities.

The company initiated automatic updates during the week of December 10, 2025, meaning many devices may already have received the security patch.

Organizations should verify their device firmware versions through the Instant On mobile application or web portal and manually trigger updates if automatic patching has not occurred.

No workarounds exist for any of the disclosed vulnerabilities, making immediate patching the only effective mitigation strategy.

Network administrators should prioritize updating devices that handle sensitive network segments or provide critical connectivity services.

HPE recommends reviewing system management and security procedures regularly to maintain infrastructure integrity and protect against similar vulnerabilities in future software releases.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityVulnerability

Share Article

David kimber

David kimber

David is a penetration tester turned security journalist with expertise in mobile security, IoT vulnerabilities, and exploit development. As an OSCP-certified security professional, David brings hands-on technical experience to his reporting on vulnerabilities and security research. His articles often feature detailed technical analysis of exploits and provide actionable defense recommendations. David maintains an active presence in the security research community and has contributed to multiple open-source security tools.

Previous Post

Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48

Next Post

Critical WordPress Plugin Exploit Grants Instant Admin Access

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us