CVE-2025-37168 Overview
An arbitrary file deletion vulnerability has been identified in a system function of mobility conductors running the AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices.
Critical Impact
Unauthenticated remote attackers can delete arbitrary files on affected mobility conductors, leading to system instability or complete denial of service.
Affected Products
- HPE Aruba Mobility Conductors running AOS-8 operating system
Discovery Timeline
- 2026-01-13 - CVE CVE-2025-37168 published to NVD
- 2026-01-13 - Last updated in NVD database
Technical Details for CVE-2025-37168
Vulnerability Analysis
This vulnerability exists within a system function of HPE Aruba mobility conductors running the AOS-8 operating system. The flaw allows unauthenticated remote attackers to delete arbitrary files on the affected system without requiring any form of authentication or user interaction. The network-accessible nature of this vulnerability significantly increases its risk exposure, as attackers can exploit it remotely over the network.
The impact primarily affects system integrity through unauthorized file deletion capabilities. While confidentiality is not directly compromised, the ability to delete critical system files can lead to service disruption and denial-of-service conditions. Organizations relying on these mobility conductors for network infrastructure management should consider this vulnerability a priority for remediation.
Root Cause
The root cause of this vulnerability lies in improper access control within a system function of the AOS-8 operating system. The affected function fails to properly validate or authenticate requests before performing file deletion operations, allowing unauthenticated users to invoke file deletion functionality that should be restricted to authorized administrators only.
Attack Vector
The vulnerability is exploitable over the network without requiring authentication or user interaction. An attacker with network access to the affected mobility conductor can send specially crafted requests to the vulnerable system function, triggering arbitrary file deletion. The attack does not require any privileges on the target system, making it particularly dangerous in environments where the management interfaces are exposed to untrusted networks.
The exploitation flow involves identifying an exposed mobility conductor running AOS-8, crafting malicious requests targeting the vulnerable system function, and specifying target files for deletion. Critical system files, configuration files, or log files could be targeted to cause service disruption or cover tracks of other malicious activities.
Detection Methods for CVE-2025-37168
Indicators of Compromise
- Unexpected file deletions on mobility conductor systems, particularly in system directories
- Missing configuration files or log files that should be present
- System instability or service disruptions on AOS-8 mobility conductors
- Unusual network traffic patterns targeting management interfaces
Detection Strategies
- Monitor file system integrity on mobility conductors using file integrity monitoring (FIM) solutions
- Implement network traffic analysis to detect anomalous requests to mobility conductor management interfaces
- Enable comprehensive logging on AOS-8 devices and forward logs to a centralized SIEM for analysis
- Configure alerts for unexpected file deletion events or access to sensitive system directories
Monitoring Recommendations
- Deploy SentinelOne agents where supported to detect suspicious file operations and potential exploitation attempts
- Establish baseline file system states on mobility conductors and alert on deviations
- Monitor for service disruptions or unexpected reboots that may indicate successful exploitation
- Review access logs for management interfaces to identify unauthorized access attempts
How to Mitigate CVE-2025-37168
Immediate Actions Required
- Review the HPE Security Advisory for specific patch information and remediation guidance
- Restrict network access to mobility conductor management interfaces using firewall rules and network segmentation
- Audit current AOS-8 deployments to identify all potentially affected systems
- Implement additional access controls and authentication mechanisms where possible
Patch Information
HPE has released a security advisory addressing this vulnerability. Administrators should consult the HPE Security Advisory for detailed patch information, including specific software versions that address CVE-2025-37168. It is strongly recommended to apply the latest security updates as soon as possible after appropriate testing.
Workarounds
- Isolate mobility conductor management interfaces to dedicated management networks inaccessible from untrusted zones
- Implement strict access control lists (ACLs) to limit which IP addresses can communicate with management functions
- Consider deploying a web application firewall or reverse proxy to filter malicious requests targeting the vulnerable function
- Enable enhanced logging and monitoring to detect and respond to exploitation attempts while awaiting patch deployment
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


