{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-37146","assignerOrgId":"eb103674-0d28-4225-80f8-39fb86215de0","state":"PUBLISHED","assignerShortName":"hpe","dateReserved":"2025-04-16T01:28:25.368Z","datePublished":"2025-10-14T16:42:31.080Z","dateUpdated":"2026-02-26T17:47:31.947Z"},"containers":{"cna":{"affected":[{"defaultStatus":"affected","product":"ArubaOS (AOS)","vendor":"Hewlett Packard Enterprise (HPE)","versions":[{"lessThanOrEqual":"10.7.1.1","status":"affected","version":"10.7.0.0","versionType":"semver"},{"lessThanOrEqual":"10.4.1.8","status":"affected","version":"10.4.0.0","versionType":"semver"},{"lessThanOrEqual":"8.13.0.1","status":"affected","version":"8.13.0.0","versionType":"semver"},{"lessThanOrEqual":"8.12.0.5","status":"affected","version":"8.12.0.0","versionType":"semver"},{"lessThanOrEqual":"8.10.0.18","status":"affected","version":"8.10.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"zzcentury from Ubisectech Sirius Team"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A vulnerability in the web-based management interface of network access point configuration services could allow an authenticated remote attacker to perform remote command execution. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system.</p>"}],"value":"A vulnerability in the web-based management interface of network access point configuration services could allow an authenticated remote attacker to perform remote command execution. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"eb103674-0d28-4225-80f8-39fb86215de0","shortName":"hpe","dateUpdated":"2025-10-14T16:42:31.080Z"},"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04958en_us&docLocale=en_US"}],"source":{"advisory":"HPESBNW04958","discovery":"INTERNAL"},"title":"Unauthorized Filesystem Operations in System Firmware allow Authenticated Remote Code Execution","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-37146","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-10-16T03:57:02.932684Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-77","description":"CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T17:47:31.947Z"}}]}}