Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37172: Vulnerability in Hewlett Packard Enterprise (HPE) ArubaOS (AOS)

0
High
VulnerabilityCVE-2025-37172cvecve-2025-37172
Published: Tue Jan 13 2026 (01/13/2026, 20:04:38 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: ArubaOS (AOS)

Description

Authenticated command injection vulnerabilities exist in the web-based management interface of mobility conductors running AOS-8 operating system. Successful exploitation could allow an authenticated malicious actor to execute arbitrary commands as a privileged user on the underlying operating system.

AI-Powered Analysis

AILast updated: 01/13/2026, 20:41:57 UTC

Technical Analysis

CVE-2025-37172 is a high-severity authenticated command injection vulnerability affecting Hewlett Packard Enterprise's ArubaOS (AOS) mobility conductors running versions 8.10.0.0 and 8.12.0.0. The vulnerability resides in the web-based management interface, which allows authenticated users to interact with the system. An attacker with valid administrative credentials can exploit this flaw to inject arbitrary commands that execute with privileged user rights on the underlying operating system. This can lead to full system compromise, including unauthorized data access, modification, or disruption of network services. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting its network attack vector, low attack complexity, requirement for high privileges, and no user interaction needed. Although no public exploits have been reported yet, the potential impact is significant given the privileged access gained. ArubaOS mobility conductors are critical components in wireless network infrastructure, managing multiple access points and network traffic, making this vulnerability particularly impactful in enterprise environments. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through access restrictions and monitoring until updates are released.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to the security and stability of wireless network infrastructure. Exploitation could lead to unauthorized command execution with elevated privileges, resulting in data breaches, network disruptions, or lateral movement within corporate networks. Critical sectors such as finance, healthcare, government, and telecommunications that rely heavily on ArubaOS-managed wireless environments could face operational downtime and data confidentiality breaches. The ability to execute arbitrary commands could also facilitate the deployment of malware or ransomware, amplifying the threat. Given the network-based attack vector and the privileged access required, insider threats or compromised administrative credentials could be leveraged to exploit this vulnerability. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for targeted attacks, especially as threat actors often develop exploits post-disclosure.

Mitigation Recommendations

1. Apply official patches from Hewlett Packard Enterprise as soon as they become available to remediate the vulnerability. 2. Restrict access to the ArubaOS web management interface to trusted administrative networks using network segmentation and firewall rules. 3. Enforce strong multi-factor authentication (MFA) for all administrative accounts to reduce the risk of credential compromise. 4. Regularly audit and monitor administrative access logs and command execution patterns for signs of suspicious activity. 5. Limit the number of users with high-privilege access to the management interface to minimize attack surface. 6. Employ network intrusion detection/prevention systems (IDS/IPS) tuned to detect anomalous command injection attempts. 7. Maintain up-to-date backups of configuration and system data to enable recovery in case of compromise. 8. Conduct regular security awareness training for administrators to recognize phishing and credential theft attempts that could lead to exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.376Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966aa78a60475309fb08828

Added to database: 1/13/2026, 8:26:32 PM

Last enriched: 1/13/2026, 8:41:57 PM

Last updated: 1/14/2026, 5:20:35 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats