Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
- Last update: 10/07/2025
- Affected software:
→ HPE (Aruba) Networking Instant On Access Points versions ≤ 3.2.0.1- Type: Use of Hard-coded Credentials
- CVE/CVSS
→ CVE-2025-37103: CVSS 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
HPE - https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US
Successful exploitation of this vulnerability in HPE (Aruba) Networking Instant On Access Points versions ≤ 3.2.0.1 allow remote attackers to bypass authentication and gain full admin access.
This vulnerability has a significant impact on confidentiality, integrity, and availability.
There is currently no evidence of this vulnerability being actively exploited.
In affected versions, HPE Networking Instant On Access Points contain a vulnerability that allows remote attackers to:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.