Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37177: Vulnerability in Hewlett Packard Enterprise (HPE) ArubaOS (AOS)

0
Medium
VulnerabilityCVE-2025-37177cvecve-2025-37177
Published: Tue Jan 13 2026 (01/13/2026, 20:08:06 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: ArubaOS (AOS)

Description

CVE-2025-37177 is an arbitrary file deletion vulnerability in the command-line interface of Hewlett Packard Enterprise ArubaOS mobility conductors running versions 8. 10. 0. 0, 8. 12. 0. 0, 10. 3. 0. 0, and 10.

AI-Powered Analysis

AILast updated: 01/21/2026, 02:56:49 UTC

Technical Analysis

CVE-2025-37177 is a vulnerability identified in Hewlett Packard Enterprise's ArubaOS (AOS) mobility conductors, specifically affecting versions 8.10.0.0, 8.12.0.0, 10.3.0.0, and 10.6.0.0. The flaw exists in the command-line interface (CLI) component, allowing an authenticated remote attacker with high privileges to delete arbitrary files on the system. This arbitrary file deletion vulnerability falls under CWE-552, which relates to files or directories being improperly deleted or modified. Exploitation requires authentication, meaning the attacker must have valid credentials with sufficient privileges to access the CLI remotely. No user interaction is needed beyond authentication, and the attack vector is network-based (AV:N). The vulnerability impacts the integrity and availability of the affected systems by enabling deletion of critical files, potentially causing service outages or degraded functionality. The CVSS 3.1 base score is 6.5, indicating a medium severity level due to the combination of high impact on integrity and availability but mitigated by the requirement for privileged authentication. No known exploits have been reported in the wild, and no official patches or updates have been linked yet, though vendors typically address such issues promptly. ArubaOS is widely used in enterprise wireless networking infrastructure, including mobility conductors that manage multiple access points and network policies. The ability to delete arbitrary files remotely could disrupt network operations, cause downtime, or require system restoration. This vulnerability is particularly concerning for organizations with large-scale wireless deployments relying on ArubaOS for critical connectivity.

Potential Impact

For European organizations, the impact of CVE-2025-37177 could be significant, especially for those in sectors reliant on stable and secure wireless infrastructure such as finance, healthcare, government, and critical infrastructure. Exploitation could lead to denial of service or degraded network performance by deleting essential system files, potentially interrupting business operations and causing financial and reputational damage. Since the vulnerability requires authenticated access with high privileges, the risk is heightened if credential compromise or insider threats exist. The disruption of ArubaOS mobility conductors could affect thousands of connected devices and users, amplifying operational impact. Additionally, recovery may require system reinstallation or restoration from backups, increasing downtime. European organizations with compliance requirements around availability and integrity (e.g., GDPR, NIS Directive) may face regulatory scrutiny if such incidents occur. The lack of currently available patches means organizations must rely on compensating controls until updates are released.

Mitigation Recommendations

1. Restrict CLI access strictly to trusted administrators using network segmentation, VPNs, or jump hosts to minimize exposure. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), for all users with CLI access to reduce risk from credential compromise. 3. Monitor system logs and file integrity to detect unusual file deletion activities promptly. 4. Implement role-based access control (RBAC) to limit the number of users with high privilege levels capable of exploiting this vulnerability. 5. Regularly audit user accounts and remove or disable unused or unnecessary privileged accounts. 6. Maintain up-to-date backups of ArubaOS configurations and system files to enable rapid recovery in case of exploitation. 7. Stay in close contact with Hewlett Packard Enterprise for official patches or updates and apply them promptly once available. 8. Consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect suspicious CLI commands or anomalous behavior related to file deletions. 9. Conduct security awareness training for administrators to recognize and report suspicious activities. 10. Test and validate any patches or configuration changes in a controlled environment before production deployment to avoid unintended disruptions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.379Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6966aa78a60475309fb08837

Added to database: 1/13/2026, 8:26:32 PM

Last enriched: 1/21/2026, 2:56:49 AM

Last updated: 2/7/2026, 1:18:21 PM

Views: 51

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats