Hard-Coded Credentials Found in HPE Instant On Devices Allow Admin Access
22.07.2025
6030

HPE fixed two flaws in Instant On Access Points that could allow admin access and command injection. Patch now to stay secure.
HPE has rolled out fixes for two critical vulnerabilities in its Instant On Access Points that could let attackers waltz into admin accounts and execute commands like they own the place. If you're using these devices, it's time to patch up before someone else decides to take control.
The first flaw is a classic case of hard-coded credentials – the digital equivalent of leaving your keys under the mat. These default admin credentials could give attackers full access to the device's management interface, no hacking skills required.
The second vulnerability is a command injection flaw, where attackers could sneak malicious commands into the device's firmware update process. This could let them run arbitrary code on the device, potentially taking over the entire network.
HPE has released firmware updates to plug these security holes. The company hasn't seen any evidence of these vulnerabilities being exploited in the wild, but with details now public, it's only a matter of time before someone tries.
If you're managing HPE Instant On Access Points, check your firmware versions and update immediately. In the world of cybersecurity, being proactive is the only way to stay one step ahead of the bad guys.
#hack#hard-coded credentials#cybersecurity#unauthenticated access#CVE vulnerabilities
Got a topic? Write to ATLA WIRE on Telegram:t.me/atla_community

