CVE-2025-37159

5.8 MEDIUM

📋 TL;DR

This vulnerability allows an authenticated remote attacker to hijack active user sessions in the AOS-CX OS web management interface, potentially leading to unauthorized access to sensitive configuration data. It affects systems running vulnerable versions of AOS-CX OS with the web management interface enabled.

💻 Affected Systems

Products:
  • AOS-CX OS
Versions: Specific versions not detailed in reference; check HPE advisory for exact range.
Operating Systems: AOS-CX OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the web management interface user authentication service; systems with this interface disabled may not be affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could gain persistent unauthorized access to the management interface, modify network configurations, disrupt operations, or exfiltrate sensitive data.

🟠

Likely Case

An authenticated attacker hijacks a session to view or tamper with configuration settings, potentially causing service disruptions or unauthorized changes.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to temporary session compromise, quickly detected and contained.

🌐 Internet-Facing: HIGH if the web interface is exposed to the internet, as it increases attack surface and potential for exploitation.
🏢 Internal Only: MEDIUM if restricted to internal networks, but still poses risk from insider threats or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires authenticated access, making it less trivial but feasible for attackers with initial credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check HPE advisory for specific fixed versions.

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04888en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Review HPE advisory for affected versions. 2. Download and apply the recommended patch from HPE support. 3. Restart the system to ensure changes take effect.

🔧 Temporary Workarounds

Disable Web Management Interface

all

Temporarily disable the web interface to prevent exploitation until patching is possible.

no web-management enable

Restrict Access to Management Interface

all

Limit network access to the web interface using firewall rules or ACLs to trusted IPs only.

ip access-list standard TRUSTED_IPS
permit 192.168.1.0 0.0.0.255
interface vlan 1
ip access-group TRUSTED_IPS in

🧯 If You Can't Patch

  • Implement strict access controls and network segmentation to isolate management interfaces.
  • Enforce strong authentication policies and monitor for unusual session activity.

🔍 How to Verify

Check if Vulnerable:

Check the AOS-CX OS version and compare against HPE advisory for affected versions.

Check Version:

show version

Verify Fix Applied:

After patching, verify the version is updated to a fixed release and test session management functionality.

📡 Detection & Monitoring

Log Indicators:

  • Multiple session hijacking attempts
  • Unusual login patterns or IP addresses

Network Indicators:

  • Suspicious traffic to the web management interface port

SIEM Query:

source="AOS-CX" AND (event_type="session_hijack" OR login_failure>5)

🔗 References

📤 Share & Export