Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2022-37902: n/a in Hewlett Packard Enterprise Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central

0
High
VulnerabilityCVE-2022-37902cvecve-2022-37902
Published: Thu Nov 03 2022 (11/03/2022, 19:05:52 UTC)
Source: CVE
Vendor/Project: Hewlett Packard Enterprise
Product: Aruba Mobility Conductor (formerly Mobility Master); Aruba Mobility Controllers; WLAN Gateways and SD-WAN Gateways managed by Aruba Central

Description

Authenticated command injection vulnerabilities exist in the ArubaOS command line interface. Successful exploitation of these vulnerabilities results in the ability to execute arbitrary commands as a privileged user on the underlying operating system.

AI-Powered Analysis

AILast updated: 06/25/2025, 23:13:07 UTC

Technical Analysis

CVE-2022-37902 is an authenticated command injection vulnerability affecting multiple Hewlett Packard Enterprise (HPE) Aruba networking products, including Aruba Mobility Conductor (formerly known as Mobility Master), Aruba Mobility Controllers, WLAN Gateways, and SD-WAN Gateways managed via Aruba Central. The vulnerability exists within the ArubaOS command line interface (CLI), where insufficient input validation allows an authenticated user with privileged access to inject arbitrary commands. Successful exploitation enables execution of arbitrary commands with elevated privileges on the underlying operating system, potentially leading to full system compromise. The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command), indicating that the root cause is inadequate sanitization of user-supplied input in command execution contexts. The CVSS v3.1 base score is 7.2, reflecting high severity due to the network attack vector (AV:N), low attack complexity (AC:L), requirement for high privileges (PR:H), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). No public exploits have been reported in the wild to date, and no specific affected versions or patches are listed in the provided data. The vulnerability requires authenticated access with elevated privileges, which limits exposure to internal or compromised users but remains critical given the privileged command execution capability. Aruba networking products are widely deployed in enterprise environments for wireless and SD-WAN infrastructure, making this vulnerability a significant risk for network availability and security if exploited.

Potential Impact

For European organizations, exploitation of CVE-2022-37902 could lead to severe consequences including unauthorized control over critical network infrastructure components. This could result in interception or manipulation of network traffic, disruption of wireless and SD-WAN services, and potential lateral movement within corporate networks. The ability to execute arbitrary commands as a privileged user compromises the confidentiality, integrity, and availability of network operations, potentially leading to data breaches, service outages, and loss of trust. Given the reliance on Aruba products in sectors such as finance, healthcare, government, and telecommunications across Europe, the impact could extend to critical national infrastructure and sensitive data environments. The requirement for authenticated privileged access somewhat limits remote exploitation but does not eliminate insider threats or risks from compromised credentials. The absence of known public exploits reduces immediate risk but does not preclude targeted attacks or future exploit development. Organizations using Aruba Central for centralized management face additional risks if attackers gain access to the management platform, potentially enabling widespread compromise of managed devices.

Mitigation Recommendations

1. Enforce strict access controls and multi-factor authentication (MFA) for all users with privileged access to ArubaOS CLI and Aruba Central management interfaces to reduce risk of credential compromise. 2. Conduct immediate inventory and identification of all Aruba Mobility Conductors, Mobility Controllers, WLAN Gateways, and SD-WAN Gateways in the environment to assess exposure. 3. Monitor logs and network traffic for unusual command execution patterns or unauthorized access attempts on Aruba devices. 4. Apply vendor-released patches or firmware updates as soon as they become available; if no patches are currently released, engage with HPE support for mitigation guidance or workarounds. 5. Limit network access to management interfaces by implementing network segmentation and firewall rules restricting access to trusted administrative hosts. 6. Regularly review and minimize the number of users with high privilege levels on Aruba devices to reduce attack surface. 7. Employ endpoint detection and response (EDR) solutions on management workstations to detect potential credential theft or misuse. 8. Consider deploying network intrusion detection systems (NIDS) tuned to detect command injection attempts or anomalous CLI activity on Aruba devices. 9. Educate administrators on secure CLI usage and the risks of command injection vulnerabilities to prevent inadvertent exposure. These measures go beyond generic advice by focusing on access control hardening, proactive monitoring, and network segmentation tailored to the specific nature of this vulnerability and the affected Aruba products.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
hpe
Date Reserved
2022-08-08T18:45:22.550Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9838c4522896dcbec133

Added to database: 5/21/2025, 9:09:12 AM

Last enriched: 6/25/2025, 11:13:07 PM

Last updated: 2/4/2026, 8:45:46 PM

Views: 39

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats