CVE-2025-37134

7.2 HIGH

📋 TL;DR

An authenticated command injection vulnerability in the CLI binary of AOS-8 Controller/Mobility Conductor allows attackers with valid credentials to execute arbitrary commands with privileged system access. This affects organizations using Aruba's AOS-8 networking equipment. Attackers could gain full control of affected devices.

💻 Affected Systems

Products:
  • ArubaOS 8 Controller
  • Aruba Mobility Conductor
Versions: AOS-8 versions prior to 8.12.0.0
Operating Systems: ArubaOS 8
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the CLI interface. All default configurations with CLI access enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the network controller allowing lateral movement, data exfiltration, and persistent backdoor installation across the entire network infrastructure.

🟠

Likely Case

Privilege escalation leading to configuration changes, credential harvesting, and disruption of network services.

🟢

If Mitigated

Limited impact if strong authentication controls, network segmentation, and least privilege access are properly implemented.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires valid credentials but command injection is straightforward once authenticated. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AOS-8.12.0.0 or later

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04957en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Download AOS-8.12.0.0 or later from Aruba support portal. 2. Backup current configuration. 3. Upload and install the new firmware via web interface or CLI. 4. Reboot the controller after installation completes.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to trusted administrative accounts and networks only

configure terminal
aaa authentication login default local
aaa authorization exec default local
line vty 0 15
access-class TRUSTED-NETWORKS in
exit

Implement Command Filtering

all

Apply input validation and command filtering on CLI inputs

configure terminal
no privilege exec level 15
privilege exec level 1 show
privilege exec level 1 ping
exit

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate controllers from untrusted networks
  • Enforce multi-factor authentication and strong password policies for all administrative accounts

🔍 How to Verify

Check if Vulnerable:

Check current AOS version: show version | include Version. If version is below 8.12.0.0, system is vulnerable.

Check Version:

show version | include Version

Verify Fix Applied:

After patching, verify version is 8.12.0.0 or higher: show version | include Version

📡 Detection & Monitoring

Log Indicators:

  • Unusual CLI command patterns
  • Multiple failed authentication attempts followed by successful login
  • Execution of system-level commands from CLI sessions

Network Indicators:

  • Unexpected outbound connections from controllers
  • Anomalous traffic patterns from controller management interfaces

SIEM Query:

source="aruba-controller" AND (event_type="cli_command" AND command="*;*" OR command="*|*" OR command="*`*")

🔗 References

📤 Share & Export