Multiple critical vulnerabilities have been discovered in HPE Aruba Network, affecting its AOS Controllers, Gateways, and Mobility Conductor products.
Specifically, two vulnerabilities—CVE-2025-23051 and CVE-2025-23052—pose significant security risks, allowing attackers to execute arbitrary code and commands remotely.
The vulnerabilities affect multiple versions of the ArubaOS, necessitating immediate attention from network administrators and organizations utilizing HPE Aruba Networking solutions.
This vulnerability exists within the web-based management interface of the AOS-8 and AOS-10 operating systems. It allows an authenticated user to perform parameter injection, potentially overwriting arbitrary system files.
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free
HPE suggests restricting access to the CLI and web-based management interfaces to a dedicated layer 2 segment/VLAN and implementing firewall policies at layer 3 and above.
This vulnerability in the command line interface (CLI) allows an attacker with authenticated access to execute arbitrary commands with privileged user permissions on the underlying operating system.
Similar to CVE-2025-23051, HPE recommends restricting CLI and web-based management interface access to secure VLANs and enforcing robust firewall policies.
The vulnerabilities affect the following HPE Aruba Networking products:
HPE Aruba Networking recommends upgrading to the following ArubaOS versions to mitigate the identified vulnerabilities:
These vulnerabilities highlight the importance of proactive security measures in network management systems. Network administrators are urged to take immediate action by upgrading affected systems and implementing recommended security measures to protect against potential threats.
Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar