{"api_version":"1","generated_at":"2026-05-13T07:40:46+00:00","cve":"CVE-2026-44862","urls":{"html":"https://cve.report/CVE-2026-44862","api":"https://cve.report/api/cve/CVE-2026-44862.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-44862","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-44862"},"summary":{"title":"Authenticated Remote Code Execution via SQL Injection in AOS-8 and AOS-10 Operating Systems","description":"SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.","state":"PUBLISHED","assigner":"hpe","published_at":"2026-05-12 20:16:44","updated_at":"2026-05-12 20:16:44"},"problem_types":[],"metrics":[{"version":"3.1","source":"security-alert@hpe.com","type":"Secondary","score":"7.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US","name":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US","refsource":"security-alert@hpe.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-44862","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-44862","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Hewlett Packard Enterprise (HPE)","product":"HPE Aruba Networking Wireless Operating System (AOS)","version":"affected 8.13.0.0 8.13.1.1 semver","platforms":[]},{"source":"CNA","vendor":"Hewlett Packard Enterprise (HPE)","product":"HPE Aruba Networking Wireless Operating System (AOS)","version":"affected 8.12.0.0 8.12.0.6 semver","platforms":[]},{"source":"CNA","vendor":"Hewlett Packard Enterprise (HPE)","product":"HPE Aruba Networking Wireless Operating System (AOS)","version":"affected 8.10.0.0 8.10.0.21 semver","platforms":[]},{"source":"CNA","vendor":"Hewlett Packard Enterprise (HPE)","product":"HPE Aruba Networking Wireless Operating System (AOS)","version":"affected 10.7.0.0 10.7.2.2 semver","platforms":[]},{"source":"CNA","vendor":"Hewlett Packard Enterprise (HPE)","product":"HPE Aruba Networking Wireless Operating System (AOS)","version":"affected 10.8.0.0 semver","platforms":[]},{"source":"CNA","vendor":"Hewlett Packard Enterprise (HPE)","product":"HPE Aruba Networking Wireless Operating System (AOS)","version":"affected 10.4.0.0 10.4.1.10 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"zzcentury","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"HPE Aruba Networking Wireless Operating System (AOS)","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"lessThanOrEqual":"8.13.1.1","status":"affected","version":"8.13.0.0","versionType":"semver"},{"lessThanOrEqual":"8.12.0.6","status":"affected","version":"8.12.0.0","versionType":"semver"},{"lessThanOrEqual":"8.10.0.21","status":"affected","version":"8.10.0.0","versionType":"semver"},{"lessThanOrEqual":"10.7.2.2","status":"affected","version":"10.7.0.0","versionType":"semver"},{"status":"affected","version":"10.8.0.0","versionType":"semver"},{"lessThanOrEqual":"10.4.1.10","status":"affected","version":"10.4.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"zzcentury"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.</p>"}],"value":"SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"dateUpdated":"2026-05-12T19:08:40.569Z","orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe"},"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw05048en_us&docLocale=en_US"}],"source":{"advisory":"HPESBNW05048","discovery":"INTERNAL"},"title":"Authenticated Remote Code Execution via SQL Injection in AOS-8 and AOS-10 Operating Systems","x_generator":{"engine":"Vulnogram 0.2.0"}}},"cveMetadata":{"assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","assignerShortName":"hpe","cveId":"CVE-2026-44862","datePublished":"2026-05-12T19:08:16.219Z","dateReserved":"2026-05-07T21:29:07.696Z","dateUpdated":"2026-05-12T19:08:40.569Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-12 20:16:44","lastModifiedDate":"2026-05-12 20:16:44","problem_types":[],"metrics":{"cvssMetricV31":[{"source":"security-alert@hpe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"44862","Ordinal":"1","Title":"Authenticated Remote Code Execution via SQL Injection in AOS-8 a","CVE":"CVE-2026-44862","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"44862","Ordinal":"1","NoteData":"SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.","Type":"Description","Title":"Authenticated Remote Code Execution via SQL Injection in AOS-8 a"}]}}}