{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.first.org/cvss/v3.1/specification-document#Qualitative-Severity-Rating-Scale",
      "text": "High"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en-US",
    "notes": [
      {
        "category": "summary",
        "text": "HPE Aruba Networking has released a software update for the HPE Aruba Networking Private 5G Core Platform that addresses exposure of sensitive information to unauthorized actors.  ",
        "title": "Summary"
      },
      {
        "category": "general",
        "text": "This vulnerability affects HPE Aruba Networking Private 5G Core in the following software versions unless specifically noted otherwise in the details section: - HPE Aruba Networking Private 5G Core 1.24.3.0 through 1.24.3.3.\n ",
        "title": "Affected Products"
      },
      {
        "category": "general",
        "text": "HPE Aruba Networking Private 5G Core 1.24.2.2 and below. Any other HPE Aruba Networking products not specifically listed above are not affected by these vulnerabilities. ",
        "title": "Unaffected Products"
      },
      {
        "category": "other",
        "text": "HPE Aruba Networking is not aware of any public discussion or exploit code targeting this specific vulnerability as of the release date of the advisory. \n ",
        "title": "Exploitation and Public Discussion"
      },
      {
        "category": "general",
        "text": "Complete information on reporting security vulnerabilities in HPE Aruba Networking products and obtaining assistance with security incidents is available at https://www.hpe.com/support/security-response-policy. For reporting *NEW* HPE Aruba Networking security issues, email can be sent to aruba-sirt(at)hpe.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found at https://www.hpe.com/info/psrt-pgp-key ",
        "title": "HPE Aruba Networking SIRT Security Procedures"
      },
      {
        "category": "legal_disclaimer",
        "text": "(c) Copyright 2026 by Hewlett Packard Enterprise Development LP. This advisory may be redistributed freely after the release date given at the top of the text, provided that the redistributed copies are complete and unmodified, including all data and version information.",
        "title": "Legal Disclaimer"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "Email: aruba-product-sirt@hpe.com - For further details please see https://www.hpe.com/support/security-response-policy",
      "issuing_authority": "HPE Aruba Networking’s Security Incident Response Team (SIRT) is responsible for receiving, tracking, managing, and disclosing vulnerabilities in HPE Aruba Networking products. \nThe HPE Aruba Networking SIRT actively works with industry, non-profit and government organizations, and the security community when vulnerabilities are reported. \nA security vulnerability is defined as any weakness in a product that allows an attacker to compromise the confidentiality, integrity, or availability of a product, customer infrastructure, or IT system through an HPE Aruba Networking product in that environment.",
      "name": "HPE Aruba Networking",
      "namespace": "https://www.hpe.com/support/security-response-policy"
    },
    "references": [
      {
        "summary": "Original Advisory",
        "url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05002en_us&docLocale=en_US"
      },
      {
        "summary": "HPE Aruba Networking Security Advisory Archive",
        "url": "https://csaf.arubanetworking.hpe.com/"
      },
      {
        "summary": "HPE Aruba Networking Product Security Incident Response Policy",
        "url": "https://www.hpe.com/support/security-response-policy"
      }
    ],
    "title": "Multiple Vulnerabilities in HPE Aruba Networking Private 5G Core",
    "tracking": {
      "current_release_date": "2026-02-10T17:00:00.000Z",
      "generator": {
        "date": "2026-02-06T15:51:04.785Z",
        "engine": {
          "name": "Secvisogram",
          "version": "2.5.42"
        }
      },
      "id": "HPESBNW05002",
      "initial_release_date": "2026-02-10T17:00:00.000Z",
      "revision_history": [
        {
          "date": "2026-02-10T17:00:00.000Z",
          "number": "1",
          "summary": "Initial Release"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "1.25.1.0",
                "product": {
                  "name": "HPE Aruba Networking Private 5G Core",
                  "product_id": "1.25.1.0"
                }
              },
              {
                "category": "product_version_range",
                "name": "vers:semver/>=1.24.3.0|<=1.24.3.3",
                "product": {
                  "name": "HPE Aruba Networking Private 5G Core",
                  "product_id": ">=1.24.3.0|<=1.24.3.4"
                }
              }
            ],
            "category": "product_name",
            "name": "Private 5G Core"
          }
        ],
        "category": "vendor",
        "name": "HPE Aruba Networking"
      }
    ]
  },
  "vulnerabilities": [
    {
      "acknowledgments": [
        {
          "organization": "Communications Security Establishment (CSE)",
          "summary": "This vulnerability was discovered by Communications Security Establishment (CSE)"
        }
      ],
      "cve": "CVE-2026-23595",
      "notes": [
        {
          "category": "details",
          "text": "An authentication bypass in the application API allows an unauthorized administrative account to be created. A remote attacker could exploit this vulnerability to create privileged user accounts. Successful exploitation could allow an attacker to gain administrative access, modify system configurations, and access or manipulate sensitive data. ",
          "title": "Details"
        },
        {
          "category": "other",
          "text": "VULN-200",
          "title": "Internal Reference"
        }
      ],
      "product_status": {
        "fixed": [
          "1.25.1.0"
        ],
        "known_affected": [
          ">=1.24.3.0|<=1.24.3.4"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-10T17:00:00.000Z",
          "details": "To resolve the vulnerabilities described above, it is recommended to upgrade the software to HPE Aruba Networking Private 5G Core 1.25.1.0 and above. The latest version of the product is available for download at https://myenterpriselicense.hpe.com/. HPE Aruba Networking does not evaluate or patch HPE Aruba Networking  Private 5G Core Software versions that have reached their End of Support (EoS) milestone. For more information about HPE Aruba Networking Product Lifecycle and versioning policy, please visit:  \nhttps://www.hpe.com/psnow/doc/4aa5-5978enw?jumpid=in_pdfviewer-psnow. ",
          "product_ids": [
            "1.25.1.0"
          ],
          "url": "https://myenterpriselicense.hpe.com/"
        },
        {
          "category": "workaround",
          "date": "2026-02-10T17:00:00.000Z",
          "details": "None.",
          "product_ids": [
            ">=1.24.3.0|<=1.24.3.4"
          ],
          "url": "https://myenterpriselicense.hpe.com/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.8,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "environmentalScore": 8.8,
            "environmentalSeverity": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 8.8,
            "temporalSeverity": "HIGH",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            ">=1.24.3.0|<=1.24.3.4"
          ]
        }
      ],
      "title": "Unauthenticated Authentication Bypass in application API allows unauthorized administrative account creation  "
    },
    {
      "acknowledgments": [
        {
          "organization": "Communications Security Establishment, CSE",
          "summary": "This vulnerability was discovered by Communications Security Establishment (CSE)"
        }
      ],
      "cve": "CVE-2026-23596",
      "notes": [
        {
          "category": "details",
          "text": "A vulnerability in the management API of the affected product could allow an unauthenticated remote attacker to trigger service restarts. Successful exploitation could allow an attacker to disrupt services and negatively impact system availability. ",
          "title": "Details"
        },
        {
          "category": "other",
          "text": "VULN-202",
          "title": "Internal References"
        }
      ],
      "product_status": {
        "fixed": [
          "1.25.1.0"
        ],
        "known_affected": [
          ">=1.24.3.0|<=1.24.3.4"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-10T17:00:00.000Z",
          "details": "To resolve the vulnerabilities described above, it is recommended to upgrade the software to HPE Aruba Networking Private 5G Core 1.25.1.0 and above. The latest version of the product is available for download at https://myenterpriselicense.hpe.com/. HPE Aruba Networking does not evaluate or patch HPE Aruba Networking  Private 5G Core Software versions that have reached their End of Support (EoS) milestone. For more information about HPE Aruba Networking Product Lifecycle and versioning policy, please visit:  \nhttps://www.hpe.com/psnow/doc/4aa5-5978enw?jumpid=in_pdfviewer-psnow. ",
          "product_ids": [
            "1.25.1.0"
          ],
          "url": "https://myenterpriselicense.hpe.com/"
        },
        {
          "category": "workaround",
          "date": "2026-02-10T17:00:00.000Z",
          "details": "None.",
          "product_ids": [
            ">=1.24.3.0|<=1.24.3.4"
          ],
          "url": "https://myenterpriselicense.hpe.com/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "environmentalScore": 6.5,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 6.5,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            ">=1.24.3.0|<=1.24.3.4"
          ]
        }
      ],
      "title": "Unauthenticated Improper Access Control in management API allows unauthorized service disruption"
    },
    {
      "acknowledgments": [
        {
          "organization": "Communications Security Establishment, CSE",
          "summary": "This vulnerability was discovered by Communications Security Establishment (CSE)"
        }
      ],
      "cve": "CVE-2026-23597",
      "notes": [
        {
          "category": "details",
          "text": "Vulnerabilities in the API error handling of an HPE Aruba Networking  5G Core server API could allow an unauthenticated remote attacker to obtain sensitive information. Successful exploitation could allow an attacker to access details such as user accounts, roles, and system configuration, as well as to gain insight into internal services and workflows, increasing the risk of unauthorized access and elevated privileges when combined with other vulnerabilities. ",
          "title": "Details"
        },
        {
          "category": "other",
          "text": "VULN-201",
          "title": "Internal References"
        }
      ],
      "product_status": {
        "fixed": [
          "1.25.1.0"
        ],
        "known_affected": [
          ">=1.24.3.0|<=1.24.3.4"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-10T17:00:00.000Z",
          "details": "To resolve the vulnerabilities described above, it is recommended to upgrade the software to HPE Aruba Networking Private 5G Core 1.25.1.0 and above. The latest version of the product is available for download at https://myenterpriselicense.hpe.com/. HPE Aruba Networking does not evaluate or patch HPE Aruba Networking  Private 5G Core Software versions that have reached their End of Support (EoS) milestone. For more information about HPE Aruba Networking Product Lifecycle and versioning policy, please visit:  \nhttps://www.hpe.com/psnow/doc/4aa5-5978enw?jumpid=in_pdfviewer-psnow. ",
          "product_ids": [
            "1.25.1.0"
          ],
          "url": "https://myenterpriselicense.hpe.com/"
        },
        {
          "category": "workaround",
          "date": "2026-02-10T17:00:00.000Z",
          "details": "None.",
          "product_ids": [
            ">=1.24.3.0|<=1.24.3.4"
          ],
          "url": "https://myenterpriselicense.hpe.com/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "environmentalScore": 6.5,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 6.5,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            ">=1.24.3.0|<=1.24.3.4"
          ]
        }
      ],
      "title": "Unauthenticated Information Disclosure in application API allows sensitive system information exposure  "
    },
    {
      "acknowledgments": [
        {
          "organization": "Communications Security Establishment, CSE",
          "summary": "This vulnerability was discovered by Communications Security Establishment (CSE)"
        }
      ],
      "cve": "CVE-2026-23598",
      "notes": [
        {
          "category": "details",
          "text": "Vulnerabilities in the API error handling of an HPE Aruba Networking  5G Core server API could allow an unauthenticated remote attacker to obtain sensitive information. Successful exploitation could allow an attacker to access details such as user accounts, roles, and system configuration, as well as to gain insight into internal services and workflows, increasing the risk of unauthorized access and elevated privileges when combined with other vulnerabilities. ",
          "title": "Details"
        },
        {
          "category": "other",
          "text": "VULN-199",
          "title": "Internal References"
        }
      ],
      "product_status": {
        "fixed": [
          "1.25.1.0"
        ],
        "known_affected": [
          ">=1.24.3.0|<=1.24.3.4"
        ]
      },
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-02-10T17:00:00.000Z",
          "details": "To resolve the vulnerabilities described above, it is recommended to upgrade the software to HPE Aruba Networking Private 5G Core 1.25.1.0 and above. The latest version of the product is available for download at https://myenterpriselicense.hpe.com/. HPE Aruba Networking does not evaluate or patch HPE Aruba Networking  Private 5G Core Software versions that have reached their End of Support (EoS) milestone. For more information about HPE Aruba Networking Product Lifecycle and versioning policy, please visit:  \nhttps://www.hpe.com/psnow/doc/4aa5-5978enw?jumpid=in_pdfviewer-psnow. ",
          "product_ids": [
            "1.25.1.0"
          ],
          "url": "https://myenterpriselicense.hpe.com/"
        },
        {
          "category": "workaround",
          "date": "2026-02-10T17:00:00.000Z",
          "details": "None.",
          "product_ids": [
            ">=1.24.3.0|<=1.24.3.4"
          ],
          "url": "https://myenterpriselicense.hpe.com/"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "ADJACENT_NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "environmentalScore": 6.5,
            "environmentalSeverity": "MEDIUM",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "temporalScore": 6.5,
            "temporalSeverity": "MEDIUM",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            ">=1.24.3.0|<=1.24.3.4"
          ]
        }
      ],
      "title": "Unauthenticated Information Disclosure in application API allows sensitive system information exposure  "
    }
  ]
}