{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-44874","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2026-05-07T21:29:22.243Z","datePublished":"2026-05-12T19:19:25.459Z","dateUpdated":"2026-05-13T14:29:47.163Z"},"containers":{"cna":{"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2026-05-12T19:19:25.459Z"},"title":"Authenticated Arbitrary File Download via AOS-10 Web-Based Management Interface","affected":[{"vendor":"Hewlett Packard Enterprise (HPE)","product":"HPE Aruba Networking Wireless Operating System (AOS)","versions":[{"status":"affected","version":"10.7.0.0","lessThanOrEqual":"10.7.2.2","versionType":"semver"},{"status":"affected","version":"10.8.0.0","versionType":"semver"},{"status":"affected","version":"10.4.0.0","lessThanOrEqual":"10.4.1.10","versionType":"semver"}],"defaultStatus":"affected"}],"descriptions":[{"lang":"en","value":"A vulnerability exists in the web-based management interface of an AOS-10 Gateway that could allow an authenticated remote attacker to access sensitive files on the underlying operating system. Successful exploitation of this vulnerability could result in the disclosure of confidential system information, potentially enabling further attacks against the affected device.","supportingMedia":[{"type":"text/html","base64":false,"value":"<p>A vulnerability exists in the web-based management interface of an AOS-10 Gateway that could allow an authenticated remote attacker to access sensitive files on the underlying operating system. Successful exploitation of this vulnerability could result in the disclosure of confidential system information, potentially enabling further attacks against the affected device.</p>"}]}],"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseSeverity":"MEDIUM","baseScore":4.9,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N"}}],"credits":[{"lang":"en","value":"zzcentury","type":"reporter"}],"source":{"advisory":"HPESBNW05048","discovery":"INTERNAL"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-284","lang":"en","description":"CWE-284 Improper Access Control"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-05-12T19:49:05.874201Z","id":"CVE-2026-44874","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-05-13T14:29:47.163Z"}}]}}