A newly disclosed security flaw in HPE Aruba Networking Private 5G Core On-Prem is putting enterprise networks at severe risk of credential theft.
Documented under the security bulletin HPESBNW05032EN_US, this vulnerability targets the platform’s graphical user interface and allows threat actors to silently harvest administrative login details.
The security defect, officially tracked as CVE-2026-23818, stems from an open redirect issue embedded within the platform’s login architecture.
Open redirect vulnerabilities occur when a web application improperly validates user-supplied input that dictates where the browser should navigate after an action is completed.
In the case of HPE Aruba Private 5G Core On-Prem environments, the graphical user interface fails to adequately sanitize these redirection pathways during the authentication process.
This architectural oversight creates a highly exploitable loophole that threat actors can weaponize to deceive network administrators and privileged users.
Attack Execution Process
To successfully exploit CVE-2026-23818, an attacker must trick an authenticated user into clicking a specially crafted URL.
Once the target interacts with this malicious link, the system processes the normal login flow but abruptly redirects the user to an external, attacker-controlled server.
This external server hosts a spoofed login page meticulously designed to mimic the legitimate HPE Aruba 5G Core interface.
When the unsuspecting victim attempts to log in again and inputs their credentials into this fraudulent portal, the attacker captures the sensitive data.
To prevent the victim from realizing they have been compromised, the malicious site immediately redirects the user back to the authentic HPE login page.
This seamless transition makes the credential theft incredibly difficult for the end-user to detect without specialised network monitoring tools.
Network administrators managing HPE Aruba Networking Private 5G Core On-Prem systems must immediately prioritise securing their network environments.
Organizations need to review the affected software versions detailed in the official HPE security bulletin and deploy the vendor-supplied security patches to close the open redirect loophole.
Beyond immediate software patching, security operations teams must enforce robust email filtering and advanced web security protocols to intercept the delivery of the maliciously crafted URLs required for this exploit.
Training personnel to identify targeted phishing attempts, particularly those involving unexpected secondary login prompts or unusual browser redirection behavior, acts as an essential defensive layer against these types of routing attacks.
Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.

