{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.first.org/cvss/v3.1/specification-document#Qualitative-Severity-Rating-Scale",
      "text": "High"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "summary",
        "text": "HPE Networking has released patches for the HPE Aruba Networking Fabric Composer to address multiple security vulnerabilities.",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "HPE Aruba Networking Fabric Composer\nAffected Software Version(s):\nHPE Aruba Networking Fabric Composer 7.x.x:    7.2.3 and below",
        "title": "Affected Products"
      },
      {
        "category": "general",
        "text": "Any other HPE Aruba Networking products and software versions not specifically listed above are not affected by these vulnerabilities.",
        "title": "Unaffected Products"
      },
      {
        "category": "other",
        "text": "HPE Aruba Networking is not aware of any public discussion or exploit code targeting these specific vulnerabilities as of the release date of the advisory.",
        "title": "Exploitation and Public Discussion"
      },
      {
        "category": "general",
        "text": "Complete information on reporting security vulnerabilities in HPE Aruba Networking products and obtaining assistance with security incidents is available at:\nhttp://www.hpe.com/support/security-response-policy\n\nFor reporting *NEW* HPE Aruba Networking security issues, email can be sent to aruba-sirt(at)hpe.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found at:\nhttps://www.hpe.com/info/psrt-pgp-key",
        "title": "HPE Aruba Networking SIRT Security Procedures"
      },
      {
        "category": "legal_disclaimer",
        "text": "(c) Copyright 2026 by Hewlett Packard Enterprise Development LP. This advisory may be redistributed freely after the release date given at the top of the text, provided that the redistributed copies are complete and unmodified, including all data and version information.",
        "title": "Legal Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "Email: aruba-sirt(at)hpe.com - For further details please see http://www.hpe.com/support/security-response-policy",
      "issuing_authority": "HPE Aruba Networking's Security Incident Response Team (SIRT) is responsible for receiving, tracking, managing, and disclosing vulnerabilities in HPE Aruba Networking products. The HPE Aruba Networking SIRT actively works with industry, non-profit, government organizations, and the security community when vulnerabilities are reported. A security vulnerability is defined as any weakness in a product that allows an attacker to compromise the confidentiality, integrity, or availability of a product, customer infrastructure, or IT system through an HPE Aruba Networking product in that environment.",
      "name": "HPE Networking",
      "namespace": "http://www.hpe.com/support/security-response-policy"
    },
    "references": [
      {
        "summary": "Original Advisory",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04996en_us&docLocale=en_US"
      },
      {
        "summary": "HPE Aruba Networking Security Advisory Archive",
        "url": "https://csaf.arubanetworking.hpe.com/"
      },
      {
        "summary": "HPE Aruba Networking Product Security Incident Response Policy",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docLocale=en_US&docId=a00100637en_us"
      }
    ],
    "title": "HPE Aruba Networking Fabric Composer Multiple Vulnerabilities Multiple Vulnerabilities",
    "tracking": {
      "current_release_date": "2026-01-27T17:00:00.000Z",
      "generator": {
        "date": "2026-01-27T17:28:52.996Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.42"
        }
      },
      "id": "HPESBNW04996",
      "initial_release_date": "2026-01-27T17:00:00.000Z",
      "revision_history": [
        {
          "date": "2026-01-27T17:00:00.000Z",
          "number": "1",
          "summary": "Initial release"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "HPE Aruba Networking Fabric Composer 7.3.0",
                "product": {
                  "name": "HPE Aruba Networking Fabric Composer",
                  "product_id": "7.3.0"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/>=7.0.0|<=7.2.3",
                "product": {
                  "name": "HPE Aruba Networking Fabric Composer",
                  "product_id": ">=7.0.0|<=7.2.3"
                }
              }
            ],
            "category": "product_name",
            "name": "HPE Aruba Networking Fabric Composer"
          }
        ],
        "category": "vendor",
        "name": "HPE Networking"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "organization": "OpenSSL Software Foundation"
        }
      ],
      "cve": "CVE-2024-4741",
      "notes": [
        {
          "category": "details",
          "text": "Calling the OpenSSL API function SSL_free_buffers may cause memory to be accessed that was previously freed in some situations... Applications that do not call this function are not vulnerable. Our investigations indicate that this function is rarely used by applications. A call to SSL_free_buffers will succeed even though the buffer is still in use. While these scenarios could occur accidentally during normal operation, a malicious attacker could attempt to engineer a situation where this occurs.",
          "title": "Details"
        },
        {
          "category": "other",
          "text": "VULN-36",
          "title": "Internal Reference"
        }
      ],
      "product_status": {
        "fixed": [
          "7.3.0"
        ],
        "known_affected": [
          ">=7.0.0|<=7.2.3"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-27T16:00:00.000Z",
          "details": "Upgrade the HPE Aruba Networking Fabric Composer to the following version to resolve the vulnerabilities described in the details section:\n \n  - HPE Aruba Networking Fabric Composer 7.x.x:  7.3.0 and above",
          "product_ids": [
            "7.3.0"
          ]
        },
        {
          "category": "workaround",
          "date": "2026-01-27T16:00:00.000Z",
          "details": "To minimize the likelihood of an attacker exploiting this vulnerability, HPE Aruba Networking recommends that the web-based management interfaces be restricted to a dedicated layer 2 segment/VLAN and/or controlled by firewall policies at layer 3 and above.",
          "product_ids": [
            ">=7.0.0|<=7.2.3"
          ],
          "url": "https://www.arubanetworks.com/techdocs/AOS-CX/10.15/PDF/acls_832x-9300-10000.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "environmentalScore": 7.5,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            ">=7.0.0|<=7.2.3"
          ]
        }
      ],
      "title": "Use After Free with SSL_free_buffers"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Daniel Jensen (@dozernz)"
          ],
          "organization": "HPE Aruba Networking's Bug Bounty program"
        }
      ],
      "cve": "CVE-2026-23592",
      "notes": [
        {
          "category": "details",
          "text": "Insecure file operations in HPE Aruba Networking Fabric Composer’s backup functionality could allow authenticated attackers to achieve remote code execution. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.",
          "title": "Details"
        },
        {
          "category": "other",
          "text": "VULN-37",
          "title": "Internal Reference"
        }
      ],
      "product_status": {
        "fixed": [
          "7.3.0"
        ],
        "known_affected": [
          ">=7.0.0|<=7.2.3"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-27T16:00:00.000Z",
          "details": "Upgrade the HPE Aruba Networking Fabric Composer to the following version to resolve the vulnerabilities described in the details section:\n \n  - HPE Aruba Networking Fabric Composer 7.x.x:  7.3.0 and above",
          "product_ids": [
            "7.3.0"
          ]
        },
        {
          "category": "workaround",
          "date": "2026-01-27T16:00:00.000Z",
          "details": "To minimize the likelihood of an attacker exploiting this vulnerability, HPE Aruba Networking recommends that the web-based management interfaces be restricted to a dedicated layer 2 segment/VLAN and/or controlled by firewall policies at layer 3 and above.",
          "product_ids": [
            ">=7.0.0|<=7.2.3"
          ],
          "url": "https://www.arubanetworks.com/techdocs/AOS-CX/10.15/PDF/acls_832x-9300-10000.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 7.2,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "temporalScore": 7.2,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            ">=7.0.0|<=7.2.3"
          ]
        }
      ],
      "title": "Insecure File Handling allows Remote Code Execution in Backup Functionality"
    },
    {
      "acknowledgments": [
        {
          "names": [
            "Daniel Jensen (@dozernz)"
          ],
          "organization": "HPE Aruba Networking's Bug Bounty program"
        }
      ],
      "cve": "CVE-2026-23593",
      "notes": [
        {
          "category": "details",
          "text": "A vulnerability in the web-based management interface of HPE Aruba Networking Fabric Composer could allow an unauthenticated remote attacker to view some system files. Successful exploitation could allow an attacker to read files within the affected directory.",
          "title": "Details"
        },
        {
          "category": "other",
          "text": "VULN-38",
          "title": "Internal Reference"
        }
      ],
      "product_status": {
        "fixed": [
          "7.3.0"
        ],
        "known_affected": [
          ">=7.0.0|<=7.2.3"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-01-27T16:00:00.000Z",
          "details": "Upgrade the HPE Aruba Networking Fabric Composer to the following version to resolve the vulnerabilities described in the details section:\n \n  - HPE Aruba Networking Fabric Composer 7.x.x:  7.3.0 and above",
          "product_ids": [
            "7.3.0"
          ]
        },
        {
          "category": "workaround",
          "date": "2026-01-27T16:00:00.000Z",
          "details": "To minimize the likelihood of an attacker exploiting this vulnerability, HPE Aruba Networking recommends that the web-based management interfaces be restricted to a dedicated layer 2 segment/VLAN and/or controlled by firewall policies at layer 3 and above.",
          "product_ids": [
            ">=7.0.0|<=7.2.3"
          ],
          "url": "https://www.arubanetworks.com/techdocs/AOS-CX/10.15/PDF/acls_832x-9300-10000.pdf"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "environmentalScore": 7.5,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 7.5,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            ">=7.0.0|<=7.2.3"
          ]
        }
      ],
      "title": "Unauthenticated Limited File Read allows Data Exposure in Web Interface"
    }
  ]
}