Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37171: Vulnerability in Hewlett Packard Enterprise (HPE) ArubaOS (AOS)

0
High
VulnerabilityCVE-2025-37171cvecve-2025-37171
Published: Tue Jan 13 2026 (01/13/2026, 20:04:22 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: ArubaOS (AOS)

Description

CVE-2025-37171 is an authenticated command injection vulnerability in Hewlett Packard Enterprise's ArubaOS 8 mobility conductors. It affects versions 8. 10. 0. 0 and 8. 12. 0. 0 of the AOS-8 operating system. Exploitation requires authenticated access to the web-based management interface and allows execution of arbitrary commands with privileged OS-level rights. The vulnerability has a CVSS v3.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:34:19 UTC

Technical Analysis

CVE-2025-37171 is a high-severity authenticated command injection vulnerability found in Hewlett Packard Enterprise's ArubaOS (AOS) version 8, specifically affecting mobility conductors running versions 8.10.0.0 and 8.12.0.0. The vulnerability resides in the web-based management interface of these devices, which are used to centrally manage wireless network infrastructure. An authenticated attacker with access to this interface can inject arbitrary OS commands due to improper input sanitization (CWE-78), leading to execution with privileged user rights on the underlying operating system. This can result in full system compromise, allowing attackers to manipulate configurations, disrupt network services, exfiltrate sensitive data, or pivot to other internal systems. The CVSS v3.1 score of 7.2 reflects the network attack vector (AV:N), low attack complexity (AC:L), requirement for high privileges (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk due to the privileged access it grants and the critical role of ArubaOS in enterprise wireless environments. The absence of published patches at the time of disclosure necessitates immediate risk mitigation through access controls and monitoring until vendor updates are available.

Potential Impact

For European organizations, this vulnerability threatens the security and stability of wireless network infrastructure managed by ArubaOS mobility conductors. Successful exploitation can lead to unauthorized command execution with elevated privileges, enabling attackers to alter network configurations, disrupt wireless services, or gain persistent footholds within enterprise networks. This can compromise the confidentiality of sensitive data transmitted over wireless networks, degrade network availability affecting business operations, and undermine the integrity of network management. Sectors such as finance, healthcare, government, and critical infrastructure in Europe rely heavily on secure wireless connectivity, making them particularly vulnerable. Additionally, the centralized nature of mobility conductors means a single compromised device could impact multiple access points and users, amplifying the potential damage. The requirement for authenticated access somewhat limits the attack surface but does not eliminate risk, especially if credential theft or insider threats occur. The lack of known exploits currently provides a window for proactive defense, but the high severity score underscores the urgency of addressing this vulnerability.

Mitigation Recommendations

1. Immediately restrict access to the ArubaOS web-based management interface to trusted administrators only, ideally via VPN or secure management networks. 2. Enforce strong, unique authentication credentials and consider multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 3. Monitor logs and network traffic for unusual command execution patterns or unauthorized access attempts to detect potential exploitation early. 4. Implement network segmentation to isolate mobility conductors from general user networks and limit lateral movement opportunities. 5. Regularly audit user privileges and remove unnecessary administrative rights to minimize the number of accounts capable of exploiting this vulnerability. 6. Stay in close contact with Hewlett Packard Enterprise for patch releases and apply updates promptly once available. 7. Conduct internal penetration testing and vulnerability assessments focused on ArubaOS devices to identify and remediate related weaknesses. 8. Educate network administrators about this vulnerability and best practices for secure device management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.376Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966aa78a60475309fb08825

Added to database: 1/13/2026, 8:26:32 PM

Last enriched: 1/21/2026, 2:34:19 AM

Last updated: 2/7/2026, 12:26:44 PM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats