CVE-2026-23592
Published: 27 January 2026
Summary
CVE-2026-23592 is a high-severity OS Command Injection (CWE-78) vulnerability in Hpe (inferred from references). Its CVSS base score is 7.2 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 29.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
OS command injection in network management interface directly enables remote exploitation of public-facing app (T1190) and Unix shell command execution (T1059.004).
NVD Description
Insecure file operations in HPE Aruba Networking Fabric Composer’s backup functionality could allow authenticated attackers to achieve remote code execution. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.
Deeper analysisAI
CVE-2026-23592 involves insecure file operations in the backup functionality of HPE Aruba Networking Fabric Composer, enabling remote code execution. Published on 2026-01-27, this vulnerability is rated at a CVSS v3.1 base score of 7.2 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) and is associated with CWE-78 (OS Command Injection). It affects the Fabric Composer's implementation, where flaws in handling file operations during backups expose the system to exploitation.
Authenticated attackers with high privileges (PR:H) can exploit this vulnerability over the network (AV:N) with low attack complexity (AC:L) and without requiring user interaction (UI:N). Successful exploitation allows the execution of arbitrary commands on the underlying operating system, resulting in high impacts to confidentiality, integrity, and availability (C:H/I:H/A:H) within the unchanged scope (S:U).
Mitigation details are provided in the HPE advisory at https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04996en_us&docLocale=en_US.
Details
- CWE(s)