Subscriptions
Tracking
Sign in to view the affected projects.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 23 Jan 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:* |
Wed, 14 Jan 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-20 |
Wed, 14 Jan 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Arubanetworks
Arubanetworks arubaos Hp Hp arubaos Hpe Hpe arubaos |
|
| Vendors & Products |
Arubanetworks
Arubanetworks arubaos Hp Hp arubaos Hpe Hpe arubaos |
Tue, 13 Jan 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An improper input handling vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor with valid credentials to trigger unintended behavior on the affected system. | |
| Title | Improper Input Handling Vulnerability in Authenticated Configuration API Endpoint (AOS-10/AOS-8 Web UI) | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: hpe
Published:
Updated: 2026-02-26T15:04:11.948Z
Reserved: 2025-04-16T01:28:25.376Z
Link: CVE-2025-37173
Updated: 2026-01-14T15:12:05.500Z
Status : Analyzed
Published: 2026-01-13T20:16:05.340
Modified: 2026-01-23T16:44:30.923
Link: CVE-2025-37173
No data.
OpenCVE Enrichment
Updated: 2026-01-14T11:08:28Z