7.2
CVE-2025-37132
- EPSS 0.07%
- Veröffentlicht 14.10.2025 16:53:16
- Zuletzt bearbeitet 12.11.2025 16:35:17
- Quelle security-alert@hpe.com
- CVE-Watchlists
- Unerledigt
Authenticated Remote Code Execution Vulnerability in AOS-10 GW and AOS-8 Controller/Mobility Conductor Web-Based Management Interface via Arbitrary File Write
An arbitrary file write vulnerability exists in the web-based management interface of both the AOS-10 GW and AOS-8 Controller/Mobility Conductor operating systems. Successful exploitation could allow an authenticated malicious actor to upload arbitrary files and execute arbitrary commands on the underlying operating system.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Arubanetworks ≫ Arubaos Version >= 8.10.0.0 < 8.10.0.19
Arubanetworks ≫ Arubaos Version >= 8.12.0.0 < 8.12.0.6
Arubanetworks ≫ Arubaos Version >= 8.13.0.0 < 8.13.1.0
Arubanetworks ≫ Arubaos Version >= 10.4.0.0 < 10.4.1.9
Arubanetworks ≫ Arubaos Version >= 10.7.0.0 < 10.7.2.1
VulnDex Vulnerability Enrichment
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.07% | 0.214 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security-alert@hpe.com | 7.2 | 1.2 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
CWE-434 Unrestricted Upload of File with Dangerous Type
The product allows the upload or transfer of dangerous file types that are automatically processed within its environment.