{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-09T16:59:21.891","vulnerabilities":[{"cve":{"id":"CVE-2025-37168","sourceIdentifier":"security-alert@hpe.com","published":"2026-01-13T20:16:04.693","lastModified":"2026-01-23T14:53:05.873","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"Arbitrary file deletion vulnerability have been identified in a system function of mobility conductors running AOS-8 operating system. Successful exploitation of this vulnerability could allow an unauthenticated remote malicious actor to delete arbitrary files within the affected system and potentially result in denial-of-service conditions on affected devices."},{"lang":"es","value":"Se ha identificado una vulnerabilidad de eliminación arbitraria de archivos en una función del sistema de los conductores de movilidad que ejecutan el sistema operativo AOS-8. La explotación exitosa de esta vulnerabilidad podría permitir a un actor malicioso remoto no autenticado eliminar archivos arbitrarios dentro del sistema afectado y potencialmente provocar condiciones de denegación de servicio en los dispositivos afectados."}],"metrics":{"cvssMetricV31":[{"source":"security-alert@hpe.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:L","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":4.2},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-552"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"6.5.4.0","versionEndExcluding":"8.10.0.21","matchCriteriaId":"187C0AB6-1290-4FE3-9FFE-7317DC57B931"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"8.11.0.0","versionEndExcluding":"8.13.1.1","matchCriteriaId":"1C7390DD-329B-44A3-9693-34211258DF37"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.3.0.0","versionEndExcluding":"10.4.1.10","matchCriteriaId":"93E77EBB-E46E-47E5-ADD2-1BD80257B08B"},{"vulnerable":true,"criteria":"cpe:2.3:o:arubanetworks:arubaos:*:*:*:*:*:*:*:*","versionStartIncluding":"10.5.0.0","versionEndExcluding":"10.7.2.2","matchCriteriaId":"48B3A810-4DD3-403E-9A76-AB86EF7EA9D1"}]}]}],"references":[{"url":"https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us&docLocale=en_US","source":"security-alert@hpe.com","tags":["Vendor Advisory"]}]}}]}