Cyber Posture

CVE-2025-37176

MediumRCE

Published: 13 January 2026

Published
13 January 2026
Modified
23 January 2026
KEV Added
Patch
CVSS Score 6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0007 21.1th percentile
Risk Priority 13 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-37176 is a medium-severity Command Injection (CWE-77) vulnerability in Arubanetworks Arubaos. Its CVSS base score is 6.5 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique.
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059.004 Unix Shell Execution
Adversaries may abuse Unix shell commands and scripts for execution.
Why these techniques?

Command injection in remote authenticated interface directly enables exploitation of public-facing app (T1190) and arbitrary Unix shell command execution (T1059.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A command injection vulnerability in AOS-8 allows an authenticated privileged user to alter a package header to inject shell commands, potentially affecting the execution of internal operations. Successful exploit could allow an authenticated malicious actor to execute commands with the…

more

privileges of the impacted mechanism.

Deeper analysisAI

CVE-2025-37176 is a command injection vulnerability (CWE-77) in AOS-8. It enables an authenticated privileged user to alter a package header and inject shell commands, which can affect the execution of internal operations. The vulnerability was published on 2026-01-13 with a CVSS v3.1 base score of 6.5 (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N).

An authenticated malicious actor with privileged user access (PR:H) can exploit this vulnerability remotely over the network (AV:N) with low attack complexity (AC:L) and without user interaction (UI:N). Successful exploitation allows the attacker to execute arbitrary shell commands with the privileges of the impacted mechanism, resulting in high impacts to confidentiality (C:H) and integrity (I:H), but no availability impact (A:N).

Mitigation details are available in the HPE security advisory at https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us&docLocale=en_US.

Details

CWE(s)

Affected Products

arubanetworks
arubaos
8.6.0.0 — 8.10.0.21 · 8.11.0.0 — 8.13.1.1

CVEs Like This One

CVE-2025-37170Same product: Arubanetworks Arubaos
CVE-2025-37171Same product: Arubanetworks Arubaos
CVE-2025-37172Same product: Arubanetworks Arubaos
CVE-2025-37173Same product: Arubanetworks Arubaos
CVE-2025-37169Same product: Arubanetworks Arubaos
CVE-2025-37175Same product: Arubanetworks Arubaos
CVE-2025-37174Same product: Arubanetworks Arubaos
CVE-2025-37168Same product: Arubanetworks Arubaos
CVE-2025-37178Same product: Arubanetworks Arubaos
CVE-2025-25039Same vendor: Arubanetworks

References