{
  "document": {
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "tracking": {
      "generator": {
        "date": "2025-09-23T15:50:07.337Z",
        "engine": {
          "version": "2.5.35",
          "name": "Secvisogram"
        }
      },
      "current_release_date": "2025-01-22T18:00:00.000Z",
      "version": "7",
      "status": "final",
      "id": "HPESBNW04662",
      "initial_release_date": "2024-07-12T17:00:00.000Z",
      "revision_history": [
        {
          "date": "2024-07-09T17:00:00.000Z",
          "number": "1",
          "summary": "Initial release."
        },
        {
          "date": "2024-07-12T17:00:00.000Z",
          "number": "2",
          "summary": "Improvements to the Workaround, Affected Products, and Resolution Sections. Added Unaffected Products"
        },
        {
          "date": "2024-08-30T17:00:00.000Z",
          "number": "3",
          "summary": "Added AFC to Affected Products and Resolution Sections "
        },
        {
          "date": "2024-10-09T17:00:00.000Z",
          "number": "4",
          "summary": "Added Reference for Orchestrator in Resolution"
        },
        {
          "date": "2024-10-09T17:00:00.000Z",
          "number": "5",
          "summary": "Minor grammar updates"
        },
        {
          "date": "2025-01-22T17:00:00.000Z",
          "number": "6",
          "summary": "Added HPE Networking Instant On to Affected Products and Resolution Sections"
        },
        {
          "date": "2025-09-23T16:00:00.000Z",
          "number": "7",
          "summary": "Final revision with all affected and resolved versions."
        }
      ]
    },
    "lang": "en-US",
    "title": "RADIUS protocol susceptible to forgery attacks",
    "aggregate_severity": {
      "text": "Critical",
      "namespace": "https://www.first.org/cvss/v3.1/specification-document#Qualitative-Severity-Rating-Scale"
    },
    "publisher": {
      "category": "vendor",
      "namespace": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00100637en_us",
      "name": "HPE Aruba Networking",
      "issuing_authority": "HPE Aruba Networking Security Incident Response Team (SIRT) is responsible for receiving, tracking, managing, and disclosing vulnerabilities in HPE Aruba Networking products. The HPE Aruba Networking SIRT actively works with industry, non-profit, government organizations, and the security community when vulnerabilities are reported. A security vulnerability is defined as any weakness in a product that allows an attacker to compromise the confidentiality, integrity, or availability of a product, customer infrastructure, or IT system through an HPE Aruba Networking product in that environment.",
      "contact_details": "Email: aruba-sirt(at)hpe.com - For further details please see https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00100637en_us"
    },
    "notes": [
      {
        "category": "summary",
        "text": "A vulnerability in the RADIUS protocol may allow attackers to access sensitive network resources without authentication.",
        "title": "Summary"
      },
      {
        "category": "general",
        "title": "Affected Products",
        "text": "HPE Aruba Networking \n\n  - EdgeConnect SD-WAN Gateway \n\t9.5.4.0 and below \n\n  - EdgeConnect SD-WAN Orchestrator \n\t9.5.4.0 and below \n\n  - Switches running AOS-CX \n\t10.14.1000 and below \n\t10.13.1030 and below \n\t10.10.1130 and below \n\n  - WLAN Gateways and SD-WAN Gateways running AOS-10 \n\tAOS-10.6.0.2 and below \n\tAOS-10.4.1.3 and below  \n\n  - Mobility Controllers running AOS-8 \n\tAOS-8.12.0.1 and below \n\tAOS-8.10.0.13 and below \n\n  - Access Points running Instant AOS-8 and AOS-10 \n\t8.12.0.3 and below \n\t8.10.0.13 and below \n\t10.7.0.2 and below \n\t10.6.0.2 and below \n\t10.4.1.3 and below  \n\n  - Airwave Management Platform  \n\t8.3.0.2 and below \n\n  - ClearPass Policy Manager \n\t6.12.1 and below \n\t6.11.8 and below \n\n  - Aruba Fabric Composer \n\t7.1.0 and below \n\n  - HPE Networking Instant On  \n\tSwitch series 1930 and 1960 running firmware version 3.0.0.0\n\tand below in local mode (cloud mode not vulnerable) using \n\tfollowing authentication methods: \n\tAAA authentication \n\tMAC based authentication+ \n\tAccess Points running firmware version 3.0.0.0 and below. \n\nProduct versions that are End of Support (EoS) are affected by this \nvulnerability unless otherwise indicated. "
      },
      {
        "category": "other",
        "title": "Exploitation and Public Discussion",
        "text": "The original research paper this vulnerability is based on is accessible at  \nhttps://www.blastradius.fail/pdf/radius.pdf \n \nAdditionally, the IETF is working towards deprecating certain options  \nin RADIUS.  More information is accessible at  \nhttps://datatracker.ietf.org/doc/html/draft-ietf-radext-deprecating-radius-01"
      },
      {
        "category": "general",
        "title": "HPE Aruba Networking SIRT Security Procedures",
        "text": "Complete information on reporting security vulnerabilities in HPE\nAruba Networking products and obtaining assistance with security\nincidents is available at:\n\nhttps://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a\n00100637en_us\n\nFor reporting *NEW* HPE Aruba Networking security issues, email\ncan be sent to aruba-sirt(at)hpe.com. For sensitive information\nwe encourage the use of PGP encryption. Our public keys can be\nfound at:\n\nhttps://www.hpe.com/info/psrt-pgp-key\n"
      },
      {
        "category": "legal_disclaimer",
        "text": "(c) Copyright 2025 by Hewlett Packard Enterprise Development LP. This advisory may be redistributed freely after the release date given at the top of the text, provided that the redistributed copies are complete and unmodified, including all data and version information.",
        "title": "Legal Disclaimer"
      },
      {
        "category": "general",
        "title": "Unaffected Products",
        "text": "All other HPE Aruba Networking products that are not listed above are not affected by this vulnerability."
      }
    ],
    "references": [
      {
        "summary": "Original Advisory",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04662en_us&docLocale=en_US"
      },
      {
        "summary": "HPE Aruba Networking Security Advisory Archive",
        "url": "https://csaf.arubanetworking.hpe.com/"
      },
      {
        "summary": "HPE Aruba Networking Product Security Incident Response Policy",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00100637en_us"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2024-3596",
      "title": "RADIUS protocol susceptible to forgery attacks",
      "notes": [
        {
          "category": "details",
          "title": "Details",
          "text": "A forgery attack has been discovered against the Response Authenticator in RADIUS/UDP, specifically targeting RFC 2865. This attack allows a man-in-the-middle to forge a valid Access-Accept response to a client request that was initially rejected by the RADIUS server, thereby granting unauthorized network access. The vulnerability exploits a chosen-prefix collision attack on MD5, manipulating the first byte and packet attributes of Access-Reject messages to match the Response Authenticator of a forged Access-Accept message. The attack requires appending a minimal amount of collision block gibberish to the Access-Request, which is then encapsulated in Proxy-State attributes and processed by the server, ensuring the  \n\n  computed Response Authenticator matches for both the legitimate Access-Reject and the forged Access-Accept. \n\n  The attacker must have man-in-the-middle access between the RADIUS client and server and the ability to trigger an Access-Request. By predicting the Access-Reject response and computing an MD5 chosen-prefix collision (within 5 to 6 minutes, potentially faster with more resources), the attacker can modify the client request, remove any Message-Authenticator attributes if PAP authentication is used, and forge an Access-Accept response by copying the Response Authenticator from the Access-Reject response. This modified response, when sent to  \n  the client, grants the attacker unauthorized access to resources authenticated/authorized via RADIUS. "
        },
        {
          "category": "other",
          "title": "Internal References",
          "text": "ATLWL-473, ATLCP-274, ATLAX-81, ATLAW-201, ATLSP-112, ATLSP-113, ATLAM-13, ATLWL-519"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "version": "3.1",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
            "baseScore": 9,
            "baseSeverity": "CRITICAL",
            "temporalScore": 9,
            "temporalSeverity": "CRITICAL",
            "environmentalScore": 9.1,
            "environmentalSeverity": "CRITICAL",
            "attackVector": "NETWORK",
            "attackComplexity": "HIGH",
            "privilegesRequired": "NONE",
            "userInteraction": "NONE",
            "scope": "CHANGED",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "availabilityImpact": "HIGH"
          },
          "products": [
            ">=10.14.0000|<=10.14.1000",
            ">=10.13.0000|<=10.13.1030",
            ">=10.10.0000|<=10.10.1130",
            ">=10.0.0|<=10.6.0.2_gateways",
            ">=10.0.0|<=10.4.1.3_gateways",
            ">=8.12.0|<=8.12.0.1_mobility_controller",
            ">=0.0.0|<=8.10.0.13_mobility_controller",
            ">=0.0.0|<=8.3.0.2_airwave",
            ">=6.0.0|<=6.11.8_cppm",
            ">=6.12.0|<=6.12.1_cppm",
            ">=7.0.0|<=7.1.0_afc",
            ">=0.0.0|<=3.0.0_instanton"
          ]
        }
      ],
      "acknowledgments": [
        {
          "names": [
            "Sharon Goldberg",
            "Miro Haller",
            "Nadia Heninger",
            "Mike Milano",
            "Dan Shumow",
            "Marc Stevens",
            "Adam Suhl"
          ]
        }
      ],
      "product_status": {
        "fixed": [
          "8.3.0.3_airwave",
          "6.12.2_cppm",
          "6.11.9_cppm",
          "10.14.1010_aos-cx",
          "10.13.1040_aos-cx",
          "10.10.1140_aos-cx",
          "10.6.0.3_gateways",
          "10.4.1.4_gateways",
          "8.12.0.2_mobility_controller",
          "8.10.0.14_mobility_controller",
          "7.1.1_afc",
          "3.1.0_instanton",
          "9.5.4.1_gateway",
          "9.5.4.1_orch_onprem",
          "9.5.4.1_orch_aas",
          "9.5.4.1_orch_sp",
          "9.5.4.1_ec_orch",
          "10.7.1.0",
          "10.6.0.3",
          "10.4.1.4",
          "8.13.0.1",
          "8.12.0.4",
          "8.10.0.14"
        ],
        "known_affected": [
          ">=10.14.0000|<=10.14.1000",
          ">=10.13.0000|<=10.13.1030",
          ">=10.10.0000|<=10.10.1130",
          ">=10.0.0|<=10.6.0.2_gateways",
          ">=10.0.0|<=10.4.1.3_gateways",
          ">=8.12.0|<=8.12.0.1_mobility_controller",
          ">=0.0.0|<=8.10.0.13_mobility_controller",
          ">=0.0.0|<=8.3.0.2_airwave",
          ">=6.0.0|<=6.11.8_cppm",
          ">=6.12.0|<=6.12.1_cppm",
          ">=7.0.0|<=7.1.0_afc",
          ">=0.0.0|<=3.0.0_instanton",
          ">=0.0.0.0|<=9.5.4.0_gateway",
          ">=0.0.0.0|<=9.5.4.0_ec_orch",
          ">=0.0.0.0|<=9.5.4.0_orch_onprem",
          ">=0.0.0.0|<=9.5.4.0_orch_aas",
          ">=0.0.0.0|<=9.5.4.0_orch_sp",
          ">=8.12.0.0|<=8.12.0.3",
          ">=8.10.0.0|<=8.10.0.13",
          ">=10.7.0.0|<=10.7.0.2",
          ">=10.6.0.0|<=10.6.0.2",
          ">=10.4.0.0|<=10.4.1.3"
        ]
      },
      "remediations": [
        {
          "date": "2024-07-09T17:00:00.000Z",
          "category": "vendor_fix",
          "details": "This vulnerability is fixed in the following HPE Aruba Networking products’ software releases\n- - AirWave Management Platform \n  - 8.3.0.3 and above \n- - ClearPass Policy Manager \n  - 6.12.2 and above \n  - 6.11.9 and above \n  - In addition, the following steps need to be taken to enable         \n    the RADIUS Message-Authenticator on ClearPass Navigate to           \n    Administration > Server Manager > Server Configuration screen,      \n    select each server individually to enable Message-Authenticator     \n    support.                                                            \n    On the server screen, navigate to \"Service Parameters\" tab,\n    select the “Radius server” service.\n    Under the Security header, modify the parameters \n                  Require Message-Authenticator from NAD = yes \n                  Require Message-Authenticator from Proxy Server = yes \n    Save the changes. This will then restart the service with the\n    requirement that the Message-Authenticator be transmitted, or the\n    request will not be processed.\n- - Switches running AOS-CX \n  - 10.14.1010 and above \n  - 10.13.1040 and above \n  - 10.10.1140 and above\n- - WLAN Gateways and SD-WAN Gateways running AOS-10 \n  - AOS-10.6.0.3 and above \n  - AOS-10.4.1.4 and above \n- - Mobility Controllers running AOS-8 \n  - AOS-8.12.0.2 and above \n  - AOS-8.10.0.14 and above\n- - Aruba Fabric Composer\n  - 7.1.1 and above\n- - EdgeConnect SD-WAN Orchestrator \n  - Use the following link to find instructions for addressing CVE-2024-3596: \n    https://www.arubanetworks.com/techdocs/sdwan-PDFs/docs/advisories/or\nch_resolution_to_cve-2024-3596_latest.pdf\n- - HPE Networking Instant On\n  - Switch series 1930 and 1960 firmware version 3.1.0 for local mode\n  - Upgrade Access Points firmware to version 3.1.0 and use option\n    \"Require RADIUS Message-Authenticator\" if using an external guest\n    portal.\n\n\nSoftware updates for this vulnerability fix in the other affected products are forthcoming. This advisory will be updated as details on the respective product’s software versions with this vulnerability fix become available.\n\nFor more information about HPE Aruba Networking products End of Support policy visit:\n\nhttps://networkingsupport.hpe.com/end-of-life",
          "product_ids": [
            "8.3.0.3_airwave",
            "6.12.2_cppm",
            "6.11.9_cppm",
            "10.14.1010_aos-cx",
            "10.13.1040_aos-cx",
            "10.10.1140_aos-cx",
            "10.6.0.3_gateways",
            "10.4.1.4_gateways",
            "8.12.0.2_mobility_controller",
            "8.10.0.14_mobility_controller",
            "7.1.1_afc",
            "9.5.4.1_gateway",
            "9.5.4.1_orch_onprem",
            "9.5.4.1_orch_aas",
            "9.5.4.1_orch_sp",
            "9.5.4.1_ec_orch",
            "10.7.1.0",
            "10.6.0.3",
            "10.4.1.4",
            "8.13.0.1",
            "8.12.0.4",
            "8.10.0.14"
          ]
        },
        {
          "category": "workaround",
          "date": "2024-07-09T17:00:00.000Z",
          "details": "Network Operators who rely on the RADIUS protocol for device and/or     \nuser authentication should update their software and configuration      \nto a secure form of the protocol for both clients and servers.          \nWhere available, using EAP-TLS (assuming Message-Authenticator is       \nproperly configured on the RADIUS server) or RadSec will mitigate the   \nvulnerability. This work around applies to all products.                \n \nIn instances where product upgrades are not available,  \nnetwork isolation and secure VPN tunnel communications should  \nbe enforced for the RADIUS protocol to restrict access to these  \nnetwork resources from untrusted sources. \n \nFor assistance in implementing EAP-TLS or RadSec on individual products \ncontact HPE Services – Aruba Networking for assistance.\n",
          "product_ids": [
            ">=10.14.0000|<=10.14.1000",
            ">=10.13.0000|<=10.13.1030",
            ">=10.10.0000|<=10.10.1130",
            ">=10.0.0|<=10.6.0.2_gateways",
            ">=10.0.0|<=10.4.1.3_gateways",
            ">=8.12.0|<=8.12.0.1_mobility_controller",
            ">=0.0.0|<=8.10.0.13_mobility_controller",
            ">=0.0.0|<=8.3.0.2_airwave",
            ">=6.0.0|<=6.11.8_cppm",
            ">=6.12.0|<=6.12.1_cppm",
            ">=7.0.0|<=7.1.0_afc",
            ">=0.0.0.0|<=9.5.4.0_gateway",
            ">=0.0.0.0|<=9.5.4.0_ec_orch",
            ">=0.0.0.0|<=9.5.4.0_orch_onprem",
            ">=0.0.0.0|<=9.5.4.0_orch_aas",
            ">=0.0.0.0|<=9.5.4.0_orch_sp",
            ">=8.12.0.0|<=8.12.0.3",
            ">=8.10.0.0|<=8.10.0.13",
            ">=10.7.0.0|<=10.7.0.2",
            ">=10.6.0.0|<=10.6.0.2",
            ">=10.4.0.0|<=10.4.1.3"
          ]
        }
      ]
    }
  ],
  "product_tree": {
    "branches": [
      {
        "category": "vendor",
        "name": "HPE Aruba Networking",
        "branches": [
          {
            "category": "product_name",
            "name": "EdgeConnect SD-WAN Gateway",
            "branches": [
              {
                "category": "product_name",
                "name": "EdgeConnect SD-WAN Gateway",
                "branches": [
                  {
                    "category": "product_version_range",
                    "name": "vers:semver/>=0.0.0.0|<=9.5.4.0",
                    "product": {
                      "product_id": ">=0.0.0.0|<=9.5.4.0_gateway",
                      "name": "EdgeConnect SD-WAN Gateway"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "9.5.4.1",
                    "product": {
                      "name": "EdgeConnect SD-WAN Gateway",
                      "product_id": "9.5.4.1_gateway"
                    }
                  }
                ]
              }
            ]
          },
          {
            "category": "product_name",
            "name": "Aruba AirWave Management Platform",
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:semver/>=0.0.0.0|<=8.3.0.2",
                "product": {
                  "name": "Aruba AirWave Management Platform",
                  "product_id": ">=0.0.0|<=8.3.0.2_airwave"
                }
              },
              {
                "product": {
                  "name": "Aruba AirWave Management Platform",
                  "product_id": "8.3.0.3_airwave"
                },
                "category": "product_version",
                "name": "8.3.0.3_airwave_airwave"
              }
            ]
          },
          {
            "category": "product_name",
            "name": "Aruba ClearPass Policy Manager",
            "branches": [
              {
                "category": "product_version",
                "name": "6.12.2",
                "product": {
                  "name": "Aruba ClearPass Policy Manager",
                  "product_id": "6.12.2_cppm"
                }
              },
              {
                "name": "6.11.9_cppm",
                "category": "product_version",
                "product": {
                  "product_id": "6.11.9_cppm",
                  "name": "Aruba ClearPass Policy Manager"
                }
              },
              {
                "product": {
                  "name": "Aruba ClearPass Policy Manager",
                  "product_id": ">=6.0.0|<=6.11.8_cppm"
                },
                "category": "product_version_range",
                "name": "vers:semver/>=6.0.0|<=6.11.8_cppm"
              },
              {
                "product": {
                  "name": "Aruba ClearPass Policy Manager",
                  "product_id": ">=6.12.0|<=6.12.1_cppm"
                },
                "category": "product_version_range",
                "name": "vers:semver/>=6.12.0|<=6.12.1"
              }
            ]
          },
          {
            "category": "product_name",
            "name": "AOS-CX",
            "branches": [
              {
                "category": "product_version",
                "name": "10.14.1010",
                "product": {
                  "name": "AOS-CX",
                  "product_id": "10.14.1010_aos-cx"
                }
              },
              {
                "category": "product_version",
                "name": "10.13.1040",
                "product": {
                  "name": "AOS-CX",
                  "product_id": "10.13.1040_aos-cx"
                }
              },
              {
                "category": "product_version",
                "name": "10.10.1140",
                "product": {
                  "name": "AOS-CX",
                  "product_id": "10.10.1140_aos-cx"
                }
              },
              {
                "name": "vers:semver/>=10.14.0000|<=10.14.1000",
                "category": "product_version_range",
                "product": {
                  "product_id": ">=10.14.0000|<=10.14.1000",
                  "name": "AOS-CX"
                }
              },
              {
                "name": "vers:semver/>=10.13.0000|<=10.13.1030",
                "category": "product_version_range",
                "product": {
                  "product_id": ">=10.13.0000|<=10.13.1030",
                  "name": "AOS-CX"
                }
              },
              {
                "name": "vers:semver/>=10.10.0000|<=10.10.1130",
                "category": "product_version_range",
                "product": {
                  "product_id": ">=10.10.0000|<=10.10.1130",
                  "name": "AOS-CX"
                }
              }
            ]
          },
          {
            "category": "product_name",
            "name": "Mobility Controllers running ArubaOS 8",
            "branches": [
              {
                "product": {
                  "name": "Mobility Controllers running ArubaOS 8",
                  "product_id": "8.12.0.2_mobility_controller"
                },
                "category": "product_version",
                "name": "8.12.0.2"
              },
              {
                "product": {
                  "name": "Mobility Controllers running ArubaOS 8",
                  "product_id": "8.10.0.14_mobility_controller"
                },
                "category": "product_version",
                "name": "8.10.0.14"
              },
              {
                "product": {
                  "name": "Mobility Controllers running ArubaOS 8",
                  "product_id": ">=8.12.0|<=8.12.0.1_mobility_controller"
                },
                "category": "product_version_range",
                "name": "vers:semver/>=8.12.0.0|<=8.12.0.1"
              },
              {
                "product": {
                  "name": "Mobility Controllers running ArubaOS 8",
                  "product_id": ">=0.0.0|<=8.10.0.13_mobility_controller"
                },
                "category": "product_version_range",
                "name": "vers:semver/>=8.0.0.0-0.0.0.0|<=8.10.0.13"
              }
            ]
          },
          {
            "category": "product_name",
            "name": "WLAN Gateways and SD-WAN Gateways running ArubaOS 10",
            "branches": [
              {
                "category": "product_version",
                "name": "10.6.0.3",
                "product": {
                  "name": "WLAN Gateways and SD-WAN Gateways running ArubaOS 10",
                  "product_id": "10.6.0.3_gateways"
                }
              },
              {
                "category": "product_version",
                "name": "10.4.1.4",
                "product": {
                  "name": "WLAN Gateways and SD-WAN Gateways running ArubaOS 10",
                  "product_id": "10.4.1.4_gateways"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/>=10.6.0.0|<=10.6.0.2",
                "product": {
                  "name": "WLAN Gateways and SD-WAN Gateways running ArubaOS 10",
                  "product_id": ">=10.0.0|<=10.6.0.2_gateways"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/>=10.3.0.0|<=10.4.1.3",
                "product": {
                  "name": "WLAN Gateways and SD-WAN Gateways running ArubaOS 10",
                  "product_id": ">=10.0.0|<=10.4.1.3_gateways"
                }
              }
            ]
          },
          {
            "category": "product_name",
            "name": "Access Points running InstantOS 8 and ArubaOS 10",
            "branches": [
              {
                "category": "product_family",
                "name": "AOS 8 Instant",
                "branches": [
                  {
                    "category": "product_version_range",
                    "product": {
                      "name": "AOS 8 Instant",
                      "product_id": ">=8.12.0.0|<=8.12.0.3"
                    },
                    "name": "vers:semver/>=8.12.0.0|<=8.12.0.3"
                  },
                  {
                    "category": "product_version_range",
                    "product": {
                      "name": "AOS 8 Instant",
                      "product_id": ">=8.10.0.0|<=8.10.0.13"
                    },
                    "name": "vers:semver/>=8.10.0.0|<=8.10.0.13"
                  },
                  {
                    "category": "product_version",
                    "name": "8.13.0.1",
                    "product": {
                      "product_id": "8.13.0.1",
                      "name": "AOS 8 Instant"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "8.12.0.4",
                    "product": {
                      "product_id": "8.12.0.4",
                      "name": "AOS 8 Instant"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "8.10.0.14",
                    "product": {
                      "product_id": "8.10.0.14",
                      "name": "AOS 8 Instant"
                    }
                  }
                ]
              },
              {
                "name": "AOS 10",
                "category": "product_family",
                "branches": [
                  {
                    "category": "product_version_range",
                    "product": {
                      "name": "AOS 10",
                      "product_id": ">=10.7.0.0|<=10.7.0.2"
                    },
                    "name": "vers:semver/>=10.7.0.0|<=10.7.0.2"
                  },
                  {
                    "category": "product_version_range",
                    "product": {
                      "name": "AOS 10",
                      "product_id": ">=10.6.0.0|<=10.6.0.2"
                    },
                    "name": "vers:semver/>=10.6.0.0|<=10.6.0.2"
                  },
                  {
                    "category": "product_version_range",
                    "product": {
                      "name": "AOS 10",
                      "product_id": ">=10.4.0.0|<=10.4.1.3"
                    },
                    "name": "vers:semver/>=10.4.0.0|<=10.4.1.3"
                  },
                  {
                    "category": "product_version",
                    "name": "10.7.1.0",
                    "product": {
                      "product_id": "10.7.1.0",
                      "name": "AOS 10"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "10.6.0.3",
                    "product": {
                      "product_id": "10.6.0.3",
                      "name": "AOS 10"
                    }
                  },
                  {
                    "category": "product_version",
                    "name": "10.4.1.4",
                    "product": {
                      "product_id": "10.4.1.4",
                      "name": "AOS 10"
                    }
                  }
                ]
              }
            ]
          },
          {
            "category": "product_name",
            "name": "EdgeConnect Enterprise Orchestrator Global Enterprise",
            "branches": [
              {
                "category": "product_version_range",
                "name": "vers:semver/>=0.0.0.0|<=9.5.4.0",
                "product": {
                  "product_id": ">=0.0.0.0|<=9.5.4.0_ec_orch",
                  "name": "EdgeConnect Enterprise Orchestrator Global Enterprise"
                }
              },
              {
                "category": "product_family",
                "name": "Aruba EdgeConnect Enterprise Orchestrator",
                "branches": [
                  {
                    "category": "product_name",
                    "name": "Aruba EdgeConnect Enterprise Orchestrator (on prem)",
                    "branches": [
                      {
                        "category": "product_version_range",
                        "name": "vers:semver/>=0.0.0.0|<=9.5.4.0",
                        "product": {
                          "product_id": ">=0.0.0.0|<=9.5.4.0_orch_onprem",
                          "name": "EdgeConnect Enterprise Orchestrator (on prem)"
                        }
                      },
                      {
                        "name": "9.5.4.1",
                        "category": "product_version",
                        "product": {
                          "name": "EdgeConnect Enterprise Orchestrator (on prem)",
                          "product_id": "9.5.4.1_orch_onprem"
                        }
                      }
                    ]
                  },
                  {
                    "category": "product_name",
                    "name": "Aruba EdgeConnect Enterprise Orchestrator-as-a-Service",
                    "branches": [
                      {
                        "category": "product_version_range",
                        "name": "vers:semver/>=0.0.0.0|<=9.5.4.0",
                        "product": {
                          "product_id": ">=0.0.0.0|<=9.5.4.0_orch_aas",
                          "name": "Aruba EdgeConnect Enterprise Orchestrator-as-a-Service"
                        }
                      },
                      {
                        "product": {
                          "name": "EdgeConnect Enterprise Orchestrator (on prem)",
                          "product_id": "9.5.4.1_orch_aas"
                        },
                        "name": "9.5.4.1",
                        "category": "product_version"
                      }
                    ]
                  },
                  {
                    "category": "product_name",
                    "name": "Aruba EdgeConnect Enterprise Orchestrator-SP",
                    "branches": [
                      {
                        "category": "product_version_range",
                        "name": "vers:semver/>=0.0.0.0|<=9.5.4.0",
                        "product": {
                          "product_id": ">=0.0.0.0|<=9.5.4.0_orch_sp",
                          "name": "Aruba EdgeConnect Enterprise Orchestrator-SP"
                        }
                      },
                      {
                        "name": "9.5.4.1",
                        "category": "product_version",
                        "product": {
                          "name": "EdgeConnect Enterprise Orchestrator (on prem)",
                          "product_id": "9.5.4.1_orch_sp"
                        }
                      }
                    ]
                  }
                ]
              },
              {
                "category": "product_version",
                "name": "9.5.4.1",
                "product": {
                  "name": "EdgeConnect Enterprise Orchestrator Global Enterprise",
                  "product_id": "9.5.4.1_ec_orch"
                }
              }
            ]
          },
          {
            "category": "product_name",
            "name": "Aruba Fabric Composer",
            "branches": [
              {
                "category": "product_version",
                "name": "7.1.1",
                "product": {
                  "name": "Aruba Fabric Composer",
                  "product_id": "7.1.1_afc"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/>=0.0.0|<=7.1.0",
                "product": {
                  "product_id": ">=7.0.0|<=7.1.0_afc",
                  "name": "Aruba Fabric Composer"
                }
              }
            ]
          },
          {
            "branches": [
              {
                "name": "3.1.0_instanton",
                "category": "product_version",
                "product": {
                  "name": "HPE Networking Instant On",
                  "product_id": "3.1.0_instanton"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/>=0.0.0|<=3.0.0",
                "product": {
                  "name": "HPE Networking Instant On",
                  "product_id": ">=0.0.0|<=3.0.0_instanton"
                }
              }
            ],
            "category": "product_name",
            "name": "HPE Networking Instant On"
          }
        ]
      }
    ]
  }
}