HPE Issues Critical Security Patch for Instant On Access Points Vulnerability

HPE Issues Critical Security Patch for Instant On Access Points Vulnerability

Hewlett-Packard Enterprise (HPE) has rolled out critical security patches addressing a serious vulnerability in its Instant On Access Points, which could allow attackers to bypass authentication controls and gain full administrative access. The flaw, tracked as CVE-2025-37103, has received a CVSS severity rating of 9.8, indicating its high potential for exploitation.

According to an advisory from HPE, the issue stems from hard-coded login credentials embedded within the devices. “Hard-coded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication,” the company confirmed. “Successful exploitation could allow a remote attacker to gain administrative access to the system.”

Alongside this, HPE addressed a second vulnerability, CVE-2025-37102, which carries a CVSS score of 7.2. This flaw allows authenticated command injection through the command-line interface (CLI), enabling attackers with elevated access to execute arbitrary commands as a privileged user on the device’s underlying operating system.

When combined, the two flaws could form a powerful exploit chain: CVE-2025-37103 could be used to obtain unauthorized administrative access, which then could be leveraged to exploit CVE-2025-37102 and execute malicious commands—potentially opening the door for deeper system compromise and persistent access.

The vulnerabilities were responsibly disclosed by ZZ from Ubisectech Sirius Team, and both have been fixed in HPE Networking Instant On software version 3.2.1.0 and later. HPE emphasized that other product lines, including HPE Networking Instant On Switches, are not affected by these issues.

While there are currently no reports of active exploitation, HPE urges customers to update their devices immediately to reduce exposure to potential attacks. The advisory highlights the importance of staying up to date with firmware updates, especially for network-connected infrastructure that may be targeted remotely.

With the discovery of these critical flaws, HPE joins a growing list of tech vendors working swiftly to close security gaps in increasingly interconnected enterprise environments.

- Advertisement -

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles

error: Content is protected !!

Share your details to download the Cybersecurity Report 2025

Share your details to download the CISO Handbook 2025

Sign Up for CXO Digital Pulse Newsletters

Share your details to download the Research Report

Share your details to download the Coffee Table Book

Share your details to download the Vision 2023 Research Report

Download 8 Key Insights for Manufacturing for 2023 Report

Sign Up for CISO Handbook 2023

Download India’s Cybersecurity Outlook 2023 Report

Unlock Exclusive Insights: Access the article

Download CIO VISION 2024 Report

Share your details to download the report

Share your details to download the CISO Handbook 2024

Fill your details to Watch