CVE-2025-37158
Published: 18 November 2025
Summary
CVE-2025-37158 is a medium-severity OS Command Injection (CWE-78) vulnerability in Hpe Arubaos-Cx. Its CVSS base score is 6.7 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 16.8th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the command injection vulnerability by identifying, reporting, and applying vendor patches as specified in the HPE advisory.
Prevents command injection attacks by validating and sanitizing inputs at points where user-supplied commands are processed in the AOS-CX OS.
Limits the impact of successful RCE from authenticated remote attackers by enforcing least privilege on user accounts accessing the system.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Command injection vulnerability enables exploitation of remote services (T1210) and arbitrary command execution via network device CLI (T1059.008).
NVD Description
A command injection vulnerability exists in the AOS-CX Operating System. Successful exploitation could allow an authenticated remote attacker to conduct a Remote Code Execution (RCE) on the affected system.
Deeper analysisAI
CVE-2025-37158 is a command injection vulnerability (CWE-78) affecting the AOS-CX Operating System. Published on 2025-11-18T19:15:47.700, it carries a CVSS v3.1 base score of 6.7 (AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N). Successful exploitation enables an authenticated remote attacker to achieve remote code execution (RCE) on the impacted system.
An authenticated remote attacker can exploit this vulnerability to inject and execute arbitrary commands. Despite the CVSS vector indicating local access (AV:L), high attack complexity (AC:H), and no privileges required (PR:N), the description specifies remote exploitation by an authenticated user, resulting in high impacts to confidentiality and integrity but no availability disruption.
Mitigation details are available in the HPE security advisory at https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04888en_us&docLocale=en_US.
Details
- CWE(s)