A session management vulnerability in AOS-8 allows previously authenticated users to retain network access after their accounts are administratively disabled. Existing sessions are not invalidated when credentials are revoked, enabling continued access until session expiration. An attacker with compromised credentials could exploit this behavior to maintain unauthorized access even after the account has been disabled.
Metrics
Affected Vendors & Products
References
History
Tue, 12 May 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-613 |
Tue, 12 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 12 May 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A session management vulnerability in AOS-8 allows previously authenticated users to retain network access after their accounts are administratively disabled. Existing sessions are not invalidated when credentials are revoked, enabling continued access until session expiration. An attacker with compromised credentials could exploit this behavior to maintain unauthorized access even after the account has been disabled. | |
| Title | Insufficient Session Invalidation on User Account Deactivation in AOS-8 Operating System | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2026-05-12T19:47:34.867Z
Reserved: 2026-05-07T21:29:22.243Z
Link: CVE-2026-44873
Updated: 2026-05-12T19:47:19.249Z
Status : Received
Published: 2026-05-12T20:16:45.907
Modified: 2026-05-12T20:16:45.907
Link: CVE-2026-44873
No data.
OpenCVE Enrichment
Updated: 2026-05-12T21:15:29Z