Parameter Injection Vulnerability in AOS-8 and AOS-10 Operating Systems by HPE
CVE-2025-23051

7.2HIGH

Key Information:

Vendor
HP (HP)
Status
HP Aruba Networking Aos
Vendor
CVE Published:
14 January 2025

What is CVE-2025-23051?

CVE-2025-23051 is a parameter injection vulnerability found in the web-based management interface of the AOS-8 and AOS-10 Operating Systems developed by HPE. This vulnerability has the potential to adversely affect organizations by allowing authenticated users to exploit the flaw to overwrite arbitrary system files. Such exploitation can lead to unauthorized alterations in system configurations, potentially disrupting normal operations and compromising the integrity of the affected systems.

Technical Details

The vulnerability arises from improper validation of user-supplied input within the web management interface. Specifically, it allows an authenticated user to inject malicious parameters that can manipulate the processing of commands intended for system operation. This flaw underscores significant weaknesses in input handling, elevating the risk of unauthorized file modification.

Potential impact of CVE-2025-23051

  1. System Integrity Compromise: Successful exploitation could enable attackers to overwrite critical system files, leading to potential system malfunctions and data integrity issues.

  2. Operational Disruption: By altering system files, malicious actors could disrupt normal system operations, causing downtime or degraded performance, which affects business continuity.

  3. Security Breach Risk: The ability to modify system settings may create pathways for further attacks, including the installation of backdoors, paving the way for more extensive system compromises and data breaches.

Affected Version(s)

HPE Aruba Networking AOS 10.4.0.0 <= 10.4.1.4

HPE Aruba Networking AOS 8.12.0.0 <= 8.12.0.2

HPE Aruba Networking AOS 8.10.0.0 <= 8.10.0.14

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

Erik de Jong (bugcrowd.com/erikdejong)
.