Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37155: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking AOS-CX

0
High
VulnerabilityCVE-2025-37155cvecve-2025-37155
Published: Tue Nov 18 2025 (11/18/2025, 18:40:40 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: HPE Aruba Networking AOS-CX

Description

A vulnerability in the SSH restricted shell interface of the network management services allows improper access control for authenticated read-only users. If successfully exploited, this vulnerability could allow an attacker with read-only privileges to gain administrator access on the affected system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:39:28 UTC

Technical Analysis

CVE-2025-37155 is a vulnerability identified in the SSH restricted shell interface of Hewlett Packard Enterprise's Aruba Networking AOS-CX operating system, specifically versions 10.10.0000 through 10.16.0000. The flaw arises from improper access control mechanisms that fail to enforce privilege restrictions correctly for authenticated users assigned read-only access. This weakness enables an attacker who already has read-only privileges to escalate their access rights to administrator level without requiring additional authentication or user interaction. The vulnerability is classified under CWE-284 (Improper Access Control), indicating a fundamental failure in enforcing security policies. The CVSS v3.1 base score is 7.8, reflecting high severity, with vector metrics indicating local attack vector (AV:L), low attack complexity (AC:L), low privileges required (PR:L), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability presents a significant risk due to the critical nature of network management systems and the potential for complete system compromise. The affected product, HPE Aruba AOS-CX, is widely used in enterprise network environments for managing switches and other network devices, making this vulnerability a serious concern for network security.

Potential Impact

The exploitation of CVE-2025-37155 can have severe consequences for organizations globally. An attacker with read-only access can escalate privileges to administrator level, gaining full control over network management functions. This can lead to unauthorized configuration changes, interception or manipulation of network traffic, disruption of network services, and potential lateral movement within the network. The confidentiality of sensitive data managed or transmitted through the network devices can be compromised, integrity of network configurations can be undermined, and availability of critical network infrastructure can be disrupted. Given the central role of HPE Aruba AOS-CX in enterprise networking, successful exploitation could result in widespread operational outages, data breaches, and significant financial and reputational damage. The vulnerability's ease of exploitation and high impact make it a critical risk, especially in environments where network access controls are not tightly enforced or where read-only credentials are widely distributed.

Mitigation Recommendations

To mitigate CVE-2025-37155, organizations should immediately identify and inventory all HPE Aruba AOS-CX devices running affected versions (10.10.0000 through 10.16.0000). Although no official patches are currently listed, organizations should monitor HPE advisories closely for forthcoming security updates and apply them promptly once available. In the interim, restrict SSH access to network management interfaces using network segmentation, firewall rules, and access control lists to limit exposure to trusted administrators only. Review and minimize the distribution of read-only credentials, ensuring they are granted only to necessary personnel and monitored for unusual activity. Implement multi-factor authentication (MFA) where possible to add an additional security layer. Regularly audit user privileges and session logs to detect potential privilege escalation attempts. Consider deploying intrusion detection/prevention systems (IDS/IPS) to monitor for anomalous SSH activity. Finally, conduct security awareness training for network administrators to recognize and respond to suspicious behavior related to network management access.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.369Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691cc1a4fcab56a016e27ea2

Added to database: 11/18/2025, 6:57:40 PM

Last enriched: 2/27/2026, 6:39:28 AM

Last updated: 3/25/2026, 11:43:27 AM

Views: 387

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses