PT-2025-28660 · Hewlett Packard · Hpe Networking Instant On Access Points
Jane Smith
+1
·
Published
2025-07-08
·
Updated
2025-08-01
·
CVE-2025-37103
10
Critical
Base vector | Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
**Name of the Vulnerable Software and Affected Versions:**
HPE Networking Instant On Access Points versions 3.2.0 and earlier
HPE Aruba Instant On Access Points versions 3.2.0.1 and earlier
Aruba Instant On APs versions 3.2.0 and earlier
**Description:**
HPE Networking and Aruba Instant On Access Points are affected by hard-coded login credentials. Exploitation of this issue allows attackers to bypass normal device authentication and gain administrative access to the system remotely. The vulnerability could potentially allow a full system takeover if chained with a second, unspecified bug.
**Recommendations:**
HPE Networking Instant On Access Points versions 3.2.0 and earlier: Upgrade firmware to version 3.2.1.0 or later.
HPE Aruba Instant On Access Points versions 3.2.0.1 and earlier: Upgrade firmware to version 3.2.1.0 or later.
Aruba Instant On APs versions 3.2.0 and earlier: Upgrade firmware to version 3.2.1.0 or later.
Fix
Using Hardcoded Credentials
Weakness Enumeration
Related Identifiers
Affected Products
References · 30
- https://nvd.nist.gov/vuln/detail/CVE-2025-37103 · Security Note
- https://bdu.fstec.ru/vul/2025-08723 · Security Note
- https://twitter.com/cyber_sec_raj/status/1949170510211760426 · Twitter Post
- https://reddit.com/r/CVEWatch/comments/1m757ev/top_10_trending_cves_23072025 · Reddit Post
- https://twitter.com/TweetThreatNews/status/1947168852070052292 · Twitter Post
- https://twitter.com/davidbombal/status/1947542743594483884 · Twitter Post
- https://twitter.com/riskigy/status/1947810146568069363 · Twitter Post
- https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US · Note
- https://twitter.com/TheHackersNews/status/1947141558467281322 · Twitter Post
- https://t.me/thehackernews/7190 · Telegram Post
- https://twitter.com/dCypherIO/status/1947310598015877552 · Twitter Post
- https://twitter.com/dCypherIO/status/1947673132073914478 · Twitter Post
- https://twitter.com/threatcluster/status/1947234446198858056 · Twitter Post
- https://t.me/true_secator/7257 · Telegram Post
- https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US · Note