Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access

Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access

Posted on July 21, 2025July 21, 2025 By CWS

Jul 21, 2025Ravie LakshmananNetwork Safety / Vulnerability
Hewlett-Packard Enterprise (HPE) has launched safety updates to deal with a essential safety flaw affecting Instantaneous On Entry Factors that might enable an attacker to bypass authentication and acquire administrative entry to inclined methods.
The vulnerability, tracked as CVE-2025-37103, carries a CVSS rating of 9.8 out of a most of 10.0.
“Exhausting-coded login credentials had been present in HPE Networking Instantaneous On Entry Factors, permitting anybody with data of it to bypass regular system authentication,” the corporate stated in an advisory.
“Profitable exploitation might enable a distant attacker to achieve administrative entry to the system.”

Additionally patched by HPE is an authenticated command injection flaw within the command-line interface of the HPE Networking Instantaneous On Entry Factors (CVE-2025-37102, CVSS rating: 7.2) {that a} distant attacker might exploit with elevated permissions to run arbitrary instructions on the underlying working system as a privileged person.
This additionally signifies that an attacker might trend CVE-2025-37103 and CVE-2025-37102 into an exploit chain, permitting them to acquire administrative entry and inject malicious instructions into the command-line interface for follow-on exercise.
The corporate credited ZZ from Ubisectech Sirius Staff for locating and reporting the 2 points. Each vulnerabilities have been resolved in HPE Networking Instantaneous On software program model 3.2.1.0 and above.
HPE additionally famous in its advisory that different units, akin to HPE Networking Instantaneous On Switches, usually are not affected.
Whereas there isn’t a proof that both of the failings has come beneath lively exploitation, customers are suggested to use the updates as quickly as doable to mitigate potential threats.

The Hacker News Tags:Access, Admin, Credentials, Devices, Hardcoded, HPE, Instant

Post navigation

Previous Post: 3,500 Websites Hijacked to Secretly Mine Crypto Using Stealth JavaScript and WebSocket Tactics
Next Post: Microsoft Releases Urgent Patch for SharePoint RCE Flaw Exploited in Ongoing Cyber Attacks

Related Posts

20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack 20 Popular npm Packages With 2 Billion Weekly Downloads Compromised in Supply Chain Attack The Hacker News
Mesh CSMA: Breaking Attack Paths to Sensitive Data Mesh CSMA: Breaking Attack Paths to Sensitive Data The Hacker News
Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites Hackers Abuse Blockchain Smart Contracts to Spread Malware via Infected WordPress Sites The Hacker News
Iranian Cyber Threats Target U.S. Infrastructure Iranian Cyber Threats Target U.S. Infrastructure The Hacker News
Infostealer Targets OpenClaw AI, Exposes Security Flaws Infostealer Targets OpenClaw AI, Exposes Security Flaws The Hacker News
Axios Attack: Malicious Code Exploits npm Package Axios Attack: Malicious Code Exploits npm Package The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark