Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37168: Vulnerability in Hewlett Packard Enterprise (HPE) ArubaOS (AOS)

0
High
VulnerabilityCVE-2025-37168cvecve-2025-37168
Published: Tue Jan 13 2026 (01/13/2026, 20:03:08 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: ArubaOS (AOS)

Description

Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices.

AI-Powered Analysis

AILast updated: 01/13/2026, 20:26:03 UTC

Technical Analysis

CVE-2025-37168 is an arbitrary file deletion vulnerability identified in Hewlett Packard Enterprise's ArubaOS (AOS) 8 operating system, specifically affecting mobility conductors running versions 8.10.0.0 and 8.12.0.0. The vulnerability arises from a flaw in a system function that improperly handles file operations, allowing an unauthenticated remote attacker to delete arbitrary files on the device. This deletion capability can disrupt normal device operations, potentially leading to denial-of-service (DoS) conditions by removing critical system or configuration files. The vulnerability is remotely exploitable over the network without requiring any authentication or user interaction, increasing the risk of widespread exploitation. The CVSS v3.1 base score of 8.2 reflects a high severity, driven by the vulnerability's network attack vector, low complexity, no privileges required, and no user interaction needed. While confidentiality is not impacted, the integrity and availability of the affected systems are at significant risk. ArubaOS is widely deployed in enterprise wireless and mobility infrastructure, making this vulnerability particularly concerning for organizations relying on these devices for network access and management. No patches or known exploits are currently reported, but the vulnerability's characteristics suggest that exploitation could cause operational outages and service interruptions.

Potential Impact

For European organizations, the impact of CVE-2025-37168 could be substantial, especially for those heavily reliant on HPE ArubaOS-based mobility conductors for wireless network infrastructure. Successful exploitation can lead to denial-of-service conditions, disrupting network availability and potentially halting critical business operations. This can affect sectors such as finance, healthcare, government, and telecommunications, where continuous network availability is essential. The arbitrary file deletion could also compromise device integrity, requiring time-consuming recovery or reconfiguration efforts. Given the unauthenticated and remote nature of the vulnerability, attackers could launch attacks from outside the network perimeter, increasing the threat surface. Disruptions in network access could also impact remote work capabilities and IoT device connectivity, which are increasingly important in European enterprises. The lack of known exploits in the wild currently provides a window for proactive mitigation, but the high severity score indicates that organizations should prioritize addressing this vulnerability to avoid potential operational and reputational damage.

Mitigation Recommendations

1. Monitor Hewlett Packard Enterprise communications closely for official patches or firmware updates addressing CVE-2025-37168 and apply them immediately upon release. 2. Until patches are available, implement strict network segmentation to isolate ArubaOS mobility conductors from untrusted networks, minimizing exposure to remote attackers. 3. Restrict management interfaces and services to trusted IP addresses and use access control lists (ACLs) to limit network access to these devices. 4. Employ intrusion detection and prevention systems (IDS/IPS) to monitor for suspicious activity targeting ArubaOS devices, focusing on unusual file operations or deletion attempts. 5. Regularly back up device configurations and critical files to enable rapid restoration in case of file deletion or device compromise. 6. Harden device configurations by disabling unnecessary services and protocols that could be leveraged for exploitation. 7. Conduct network vulnerability scans and penetration tests focused on ArubaOS devices to identify potential exposure. 8. Train network administrators to recognize signs of exploitation and establish incident response procedures specific to ArubaOS device compromise. 9. Consider deploying network-level anomaly detection tools to identify unusual traffic patterns indicative of exploitation attempts. 10. Maintain an inventory of all ArubaOS devices and their firmware versions to ensure timely identification of affected systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.375Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966a6f3a60475309faf46d8

Added to database: 1/13/2026, 8:11:31 PM

Last enriched: 1/13/2026, 8:26:03 PM

Last updated: 1/14/2026, 5:50:56 AM

Views: 112

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats