CVE-2025-37130

6.5 MEDIUM

📋 TL;DR

This vulnerability in EdgeConnect SD-WAN's command-line interface allows authenticated attackers to read arbitrary files from the underlying filesystem. Attackers could access sensitive configuration files, credentials, or system data. Organizations using vulnerable EdgeConnect SD-WAN appliances are affected.

💻 Affected Systems

Products:
  • HPE Aruba Networking EdgeConnect SD-WAN
Versions: All versions prior to 9.4.0.0
Operating Systems: EdgeConnect SD-WAN appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated CLI access; default configurations are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain access to sensitive configuration files, credentials, or cryptographic keys, potentially leading to full system compromise or lateral movement within the network.

🟠

Likely Case

Attackers exfiltrate configuration data, user credentials, or network topology information that could be used for further attacks.

🟢

If Mitigated

Attackers can only access non-sensitive files or are blocked by proper access controls and monitoring.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated CLI access; exploitation involves specific CLI commands to read files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 9.4.0.0 and later

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04943en_us&docLocale=en_US

Restart Required: No

Instructions:

1. Download EdgeConnect SD-WAN version 9.4.0.0 or later from HPE support portal. 2. Follow standard upgrade procedures for EdgeConnect appliances. 3. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to only trusted administrators using role-based access controls.

Monitor CLI Activity

all

Enable detailed logging of CLI commands and monitor for suspicious file read attempts.

🧯 If You Can't Patch

  • Implement strict access controls to limit CLI access to essential personnel only.
  • Deploy network segmentation to isolate EdgeConnect appliances from sensitive systems.

🔍 How to Verify

Check if Vulnerable:

Check EdgeConnect SD-WAN version via CLI: 'show version' or web interface System > About.

Check Version:

show version

Verify Fix Applied:

Verify version is 9.4.0.0 or later using 'show version' command.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI sessions
  • File read operations via CLI commands
  • Multiple failed authentication attempts followed by successful CLI login

Network Indicators:

  • Unexpected outbound data transfers from EdgeConnect appliances
  • Anomalous CLI access patterns

SIEM Query:

source="edgeconnect" AND (event_type="cli_command" AND command="*read*" OR command="*cat*" OR command="*more*")

🔗 References

📤 Share & Export