HPE has identified multiple high-severity vulnerabilities affecting Aruba Networking Instant On access points and 1930 switches, primarily impacting devices operating in router mode and running software version 3.3.1.0 or earlier. The most critical flaw, CVE-2025-37165, stems from improper handling of network traffic within the device’s routing and segmentation logic. Due to insufficient validation of packet flows, internal VLAN and network segmentation metadata can be unintentionally exposed over interfaces not intended to disclose such information. An unauthenticated attacker with network access could exploit this behavior by sending specially crafted packets to the affected device. Successful exploitation may allow the attacker to infer internal VLAN structures, IP segmentation schemes, and routing configurations. While the flaw does not directly grant administrative access, the leaked information significantly lowers the barrier for network reconnaissance, enabling attackers to plan targeted lateral movement, privilege escalation attempts, or secondary attacks against sensitive internal services. The vulnerability is rated High severity (CVSS v3.1 score: 7.5) due to its remote exploitability and confidentiality impact, despite requiring no user interaction or credentials. In addition to information disclosure, CVE-2025-37166 introduces a separate risk where malformed packets can force the access point into a non-responsive state, resulting in a denial-of-service condition that requires manual reboot to restore functionality. Further compounding the threat landscape, HPE also disclosed underlying kernel-level flaws (including CVE-2023-52340 and CVE-2022-48839) related to packet processing, which may cause system instability or crashes under certain conditions. Although no active exploitation has been observed at the time of disclosure, the silent nature of the data exposure makes detection difficult, reinforcing the need for immediate remediation.
AVEVA has announced the discovery of seven critical and high-severity security vulnerabilities affecting its Process Optimization software, previously known as ROMeo. Disclosed on ...
TP-Link has disclosed a high-severity authentication bypass vulnerability affecting its VIGI security camera product line, tracked as CVE-2026-0629, which allows attackers on the s...
The Everest ransomware group has claimed responsibility for a major cyberattack targeting McDonald’s India, alleging that it exfiltrated approximately 861 GB of sensitive data. T...