Home

Description

SQL injection vulnerabilities exist in several underlying service components accessible through the AOS-8 and AOS-10 command-line interface and management protocol. An authenticated attacker with administrative privileges could exploit these vulnerabilities by injecting crafted input into parameters that are passed unsanitized to backend database queries. Successful exploitation could allow the attacker to execute arbitrary commands on the underlying operating system.

PUBLISHED Reserved 2026-05-07 | Published 2026-05-12 | Updated 2026-05-13 | Assigner hpe




HIGH: 7.2CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Product status

Default status
affected

8.13.0.0 (semver)
affected

8.12.0.0 (semver)
affected

8.10.0.0 (semver)
affected

10.7.0.0 (semver)
affected

10.8.0.0 (semver)
affected

10.4.0.0 (semver)
affected

Credits

zzcentury reporter

References

support.hpe.com/...y?docId=hpesbnw05048en_us&docLocale=en_US

cve.org (CVE-2026-44862)

nvd.nist.gov (CVE-2026-44862)

Download JSON