Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37169: Vulnerability in Hewlett Packard Enterprise (HPE) ArubaOS (AOS)

0
High
VulnerabilityCVE-2025-37169cvecve-2025-37169
Published: Tue Jan 13 2026 (01/13/2026, 20:03:33 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: ArubaOS (AOS)

Description

A stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system.

AI-Powered Analysis

AILast updated: 01/13/2026, 20:25:50 UTC

Technical Analysis

CVE-2025-37169 is a stack overflow vulnerability identified in the AOS-10 web-based management interface of Hewlett Packard Enterprise's ArubaOS Mobility Gateway devices. The flaw exists in the handling of certain inputs within the management interface, which can cause a stack overflow condition. When exploited by an authenticated user with high privileges, this vulnerability allows arbitrary code execution on the underlying operating system with privileged access. This means an attacker who has valid credentials and sufficient privileges can execute malicious code, potentially taking full control of the device. The affected versions are ArubaOS 10.3.0.0 and 10.6.0.0. The CVSS 3.1 base score is 7.2, reflecting high severity due to network attack vector, low attack complexity, required high privileges, no user interaction, and high impact on confidentiality, integrity, and availability. No public exploits or active exploitation have been reported yet. The vulnerability poses a significant risk to network security as ArubaOS Mobility Gateways are often deployed in enterprise and service provider environments to manage wireless and wired network access. Compromise of these devices could lead to interception or manipulation of network traffic, disruption of network services, and lateral movement within the network.

Potential Impact

For European organizations, the impact of CVE-2025-37169 could be substantial, especially for those relying on ArubaOS Mobility Gateways for critical network infrastructure. Exploitation could lead to full compromise of network access devices, enabling attackers to intercept sensitive communications, disrupt network availability, and manipulate network configurations. This could affect sectors such as finance, healthcare, government, and telecommunications, where network integrity and confidentiality are paramount. The requirement for authenticated high-privilege access somewhat limits the attack surface to insiders or attackers who have already compromised credentials, but the potential damage remains high. Given the widespread use of HPE Aruba products in Europe, particularly in large enterprises and public sector networks, the vulnerability could facilitate advanced persistent threats or insider attacks, undermining trust in network security and compliance with data protection regulations like GDPR.

Mitigation Recommendations

To mitigate CVE-2025-37169, European organizations should immediately verify if their ArubaOS Mobility Gateway devices run affected versions 10.3.0.0 or 10.6.0.0 and prioritize upgrading to patched versions once available from HPE. Until patches are applied, organizations should enforce strict access controls on the management interface, limiting access to trusted administrators via network segmentation and VPNs. Multi-factor authentication (MFA) should be enabled for all administrative accounts to reduce the risk of credential compromise. Regularly audit user privileges and remove unnecessary high-privilege accounts. Monitor logs for unusual administrative activity that could indicate exploitation attempts. Employ network intrusion detection systems tuned to detect anomalous behavior on ArubaOS devices. Additionally, implement strict password policies and consider temporary disabling of web-based management interfaces if operationally feasible. Coordination with HPE support for timely patch deployment and guidance is critical.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.376Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966a6f3a60475309faf46db

Added to database: 1/13/2026, 8:11:31 PM

Last enriched: 1/13/2026, 8:25:50 PM

Last updated: 1/14/2026, 6:20:26 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats