
[CIVN-2025-0334]Multiple Vulnerabilities in HPE Aruba Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in HPE Aruba Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: High
Software Affected:
· HPE Aruba Networking 100 Series Cellular Bridge version(s)
o AOS-10.7.1.x: 10.7.1.1 and below
· HPE Aruba Networking Management Software (AirWave)
o 8.3.0.4 and below
Overview:
Multiple vulnerabilities have been reported in the HPE Aruba Networking 100 Series Cellular Bridge that could be exploited by an authenticated attacker with administrative credentials to execute arbitrary code on the targeted system.
Target Audience:
Network and Security Administrators,IT Operations and System Engineers,Enterprise Architects and CIOs/CTOs,Managed Service Providers (MSPs)
Risk Assessment:
There are high risks of Confidentiality, Operational, Integrity, and Availability
Impact Assessment:
There are high risks of Confidentiality, Integrity, and Availability
Description:
1. Denial-of-Service (DoS) Vulnerability CVE-2025-37161
A Vulnerability exists in HPE Aruba Networking 100 Series Cellular Bridge the web-based management interface could allow an unauthenticated remote attacker to cause a denial of service.
Successfully exploitation of this vulnerability could allow an attacker to crash the system, preventing it from rebooting without manual intervention and disrupting network operations.
2. Command Injection Vulnerability CVE-2025-37162 , CVE-2025-37163
These Vulnerabilities exists in HPE Aruba Networking 100 Series Cellular Bridge and HPE Aruba Networking Airwave Platform the command line interface could allow an authenticated remote attacker to conduct a command injection attack.
Successfully exploitation of this vulnerability could allow an attacker to execute arbitrary commands on the underlying operating system.
Solution
Apply appropriate software updates as mentioned by Security vendor
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04970en_us&docLocale=en_US
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04971en_us&docLocale=en_US
References:
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04970en_us&docLocale=en_US
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04971en_us&docLocale=en_US
CVE Name
CVE-2025-37161
CVE-2025-37162
CVE-2025-37163
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=OH7h
—–END PGP SIGNATURE—–


