CVE-2025-37133

7.2 HIGH

📋 TL;DR

An authenticated command injection vulnerability in the CLI binary of AOS-8 Controller/Mobility Conductor allows authenticated attackers to execute arbitrary commands as privileged users on the underlying operating system. This affects organizations using Aruba's AOS-8 networking equipment with vulnerable versions.

💻 Affected Systems

Products:
  • Aruba AOS-8 Controller
  • Aruba Mobility Conductor
Versions: AOS-8 versions prior to 8.12.0.0
Operating Systems: AOS-8 operating system
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the CLI interface. All deployments with vulnerable versions are affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to install persistent backdoors, exfiltrate sensitive network configuration data, pivot to other network segments, and disrupt network operations.

🟠

Likely Case

Attackers with valid credentials gain full administrative control over the affected device, enabling network reconnaissance, configuration changes, and potential lateral movement.

🟢

If Mitigated

Limited impact due to strong authentication controls, network segmentation, and restricted administrative access preventing exploitation.

🌐 Internet-Facing: MEDIUM - While authentication is required, internet-facing management interfaces could be targeted by credential stuffing or phishing attacks.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain privileged access and potentially pivot to other systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but command injection vulnerabilities are typically straightforward to exploit once authentication is bypassed or obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AOS-8 version 8.12.0.0 and later

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04957en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Download AOS-8 version 8.12.0.0 or later from HPE support portal. 2. Backup current configuration. 3. Upload and install the new firmware via the web interface or CLI. 4. Reboot the device as required. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to only trusted administrative users and networks using access control lists.

configure terminal
access-list ip <name> permit <trusted-network> <mask>
apply access-list ip <name> to controller-management

Implement Strong Authentication

all

Enforce multi-factor authentication and strong password policies for all administrative accounts.

🧯 If You Can't Patch

  • Implement network segmentation to isolate management interfaces from general network traffic
  • Monitor and audit all CLI access attempts and command execution for suspicious activity

🔍 How to Verify

Check if Vulnerable:

Check the AOS-8 version via CLI: 'show version' and verify if it's below 8.12.0.0

Check Version:

show version

Verify Fix Applied:

After patching, run 'show version' to confirm version is 8.12.0.0 or higher and test command injection attempts fail

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command patterns
  • Multiple failed authentication attempts followed by successful login
  • Execution of system commands from CLI sessions

Network Indicators:

  • Unusual outbound connections from controller management interface
  • Traffic to unexpected destinations from controller

SIEM Query:

source="aruba-controller" AND (event_type="cli_command" AND command="*system*" OR command="*exec*" OR command="*shell*")

🔗 References

📤 Share & Export