CVE Vulnerabilities

CVE-2025-37174

Insecure Inherited Permissions

Published: Jan 13, 2026 | Modified: Jan 23, 2026
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Authenticated arbitrary file write vulnerability exists in the web-based management interface of mobility conductors running either AOS-10 or AOS-8 operating systems. Successful exploitation could allow an authenticated malicious actor to create or modify arbitrary files and execute arbitrary commands as a privileged user on the underlying operating system.

Weakness

A product defines a set of insecure permissions that are inherited by objects that are created by the program.

Affected Software

NameVendorStart VersionEnd Version
ArubaosArubanetworks6.5.4.0 (including)8.10.0.21 (excluding)
ArubaosArubanetworks8.11.0.0 (including)8.13.1.1 (excluding)
ArubaosArubanetworks10.3.0.0 (including)10.4.1.10 (excluding)
ArubaosArubanetworks10.5.0.0 (including)10.7.2.2 (excluding)

Potential Mitigations

  • Compartmentalize the system to have “safe” areas where trust boundaries can be unambiguously drawn. Do not allow sensitive data to go outside of the trust boundary and always be careful when interfacing with a compartment outside of the safe area.
  • Ensure that appropriate compartmentalization is built into the system design, and the compartmentalization allows for and reinforces privilege separation functionality. Architects and designers should rely on the principle of least privilege to decide the appropriate time to use privileges and the time to drop privileges.

References