CVE-2025-37136

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated remote attackers to delete arbitrary files on Aruba AOS-8 Controller/Mobility Conductor systems via the command-line interface. This affects organizations using these networking devices for wireless management. Attackers could disrupt operations or delete critical configuration files.

💻 Affected Systems

Products:
  • Aruba AOS-8 Controller
  • Aruba Mobility Conductor
Versions: AOS-8 versions prior to 8.12.0.0
Operating Systems: ArubaOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the CLI interface. All default configurations with CLI access enabled are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical system files, configuration loss, service disruption, or potential privilege escalation by deleting security controls.

🟠

Likely Case

Service disruption through deletion of configuration files, logs, or operational files leading to network downtime or degraded performance.

🟢

If Mitigated

Limited impact with proper access controls, file integrity monitoring, and regular backups allowing quick restoration of deleted files.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated CLI access. Attack complexity is medium due to authentication requirement but file deletion is straightforward once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: AOS-8 version 8.12.0.0 or later

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04957en_us&docLocale=en_US

Restart Required: No

Instructions:

1. Download AOS-8 version 8.12.0.0 or later from Aruba support portal. 2. Upload the firmware to the controller. 3. Apply the update through the controller's upgrade interface. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Restrict CLI Access

all

Limit CLI access to trusted administrative users only and implement strong authentication controls.

configure terminal
aaa authentication login default local
aaa authorization exec default local
username admin privilege 15 secret your_strong_password

Implement File Integrity Monitoring

all

Monitor critical system files for unauthorized changes or deletions using file integrity monitoring tools.

🧯 If You Can't Patch

  • Implement strict access controls to limit CLI access to essential administrative personnel only
  • Enable comprehensive logging and monitoring of file deletion activities and CLI sessions

🔍 How to Verify

Check if Vulnerable:

Check the AOS version with 'show version' command. If version is below 8.12.0.0, the system is vulnerable.

Check Version:

show version

Verify Fix Applied:

After patching, run 'show version' to confirm version is 8.12.0.0 or higher.

📡 Detection & Monitoring

Log Indicators:

  • CLI session logs showing file deletion commands
  • System logs showing unexpected file deletions or missing files
  • Authentication logs for suspicious CLI access

Network Indicators:

  • Unusual CLI access patterns or connections
  • SSH/Telnet sessions to management interfaces from unexpected sources

SIEM Query:

source="aruba-controller" AND (event_type="file_deletion" OR command="delete" OR command="rm")

🔗 References

📤 Share & Export