-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 HPE Aruba Networking Product Security Advisory ============================================== Advisory ID: HPESBNW04994 CVE: CVE-2025-37186 Publication Date: 2026-Jan-13 Last Updated: 2026-Jan-27 Status: Confirmed Severity: High Revision: 2 Title ===== Local Privilege Escalation Vulnerability in HPE Aruba Networking Virtual Intranet Access (VIA) Client for Linux Overview ======== HPE Aruba Networking has become aware of a publicly reported vulnerability in the HPE Aruba Networking VIA client for Linux. Affected Products ================= This vulnerability affects HPE Aruba Networking VIA clients running the following version unless specifically noted otherwise in the details section: HPE Aruba Networking VIA client for Linux: - 4.7.5 and below Unaffected Products: HPE Aruba Networking - VIA client for Microsoft Windows. - VIA client for MacOS. - VIA client for iOS. - VIA client for Android. Details ======= Local Privilege Escalation Vulnerability in HPE Aruba Networking Virtual Intranet Access (VIA) Client for Linux (CVE-2025-37186) - ------------------------------------------------------------------ A local privilege-escalation vulnerability has been discovered in the HPE Aruba Networking Virtual Intranet Access (VIA) client. Successful exploitation of this vulnerability could allow a local attacker to achieve arbitrary code execution with root privileges. Internal references: VULN-169 Severity: High CVSS v3.1 Base Score: 7.8 CVSS Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H Discovery: This vulnerability was discovered by John Carroll. Resolution ========== Upgrade HPE Aruba Networking Virtual Intranet Access (VIA) for Linux to the following software version (as applicable) to resolve the vulnerability described above in the details sections: - HPE Aruba Networking VIA for Linux version 4.7.6 and above HPE Aruba Networking does not evaluate or patch HPE Aruba Networking Virtual Intranet Access (VIA) versions that have reached their End of Maintenance (EoM) milestone. For more information about HPE Aruba Networking's End of Life policy visit: https://www.hpe.com/psnow/doc/a00143052enw Workaround ========== To mitigate the risk of privilege escalation vulnerability, please refer to the attached supplement (file) that shows an example of how to configure file access policy rules (fapolicy.d) to prevent loading of arbitrary shared objects. Alternatively, you may also follow the mitigation instructions available at https://csaf.arubanetworking.hpe.com/2026/via-fapolicyd-mitigation-instructions.pdf. In an enterprise environment where users have limited permissions to configure their Linux machines, administrators may use common Linux configuration management tools to distribute and enable the desired file access policy that is in line with the organization?s network security directives. Exploitation and Public Discussion ================================== The listed vulnerability was publicly disclosed at a link that has since been redacted by the researcher. HPE Networking thanks John Carroll for the finding. As of the release date of this advisory, HPE Networking is not aware of any active public exploitation. Revision History ================ Revision 1 / 2026-01-13 / Initial release. Revision 2 / 2026-01-27 / Updated Resolution section. HPE Aruba Networking SIRT Security Procedures ============================== Complete information on reporting security vulnerabilities in HPE Aruba Networking products and obtaining assistance with security incidents is available at: https://www.hpe.com/support/security-response-policy For reporting *NEW* HPE Aruba Networking security issues, email can be sent to aruba-sirt(at)hpe.com. For sensitive information we encourage the use of PGP encryption. Our public keys can be found at: https://www.hpe.com/info/psrt-pgp-key (c) Copyright 2026 by Hewlett Packard Enterprise Development LP. This advisory may be redistributed freely after the release date given at the top of the text, provided that the redistributed copies are complete and unmodified, including all data and version information. -----BEGIN PGP SIGNATURE----- iQHLBAEBCAA1FiEEMErWmuZGsYOCo0+xpjMm7I0cE64FAmlz7BkXHHNlY3VyaXR5 LWFsZXJ0QGhwZS5jb20ACgkQpjMm7I0cE64p8gv7Bokk4lol9C8VLUWGEFB8Qm33 Tl+RvkbQVjkR/T/mAVQCmP4oYpTx2LU8N9B61JtRoNJ1wQrnp1gMBmgiHZgmzUNg OMPgyNkZdfjIZAe5fFOVm1htAENxGIiBos88HCulS9mQ/2N1b2JgH0trx96H/wd7 ROgo0pNBHgwzyq3glqatYOxNWLoh3l2Am1AquCPeB5uIPBN0YUs5P9kMvLh+x2H/ KhRmZE2lOFcefBSei+OrTMYZ+jjMU2UjUew+OxjTlzaEoT/e4isdQqnsOFEI6Yww yZVvkTEFNM2ITpCEZ16ULjj+ZXX/Q88tJ35j+gQsb8t2TbNupQciRDx3lOW4wqNj 4eKzr2+KHq/6p7rbZ6dlg33dcn+daG4sP38BKTbIyzOp886B0aFzABpAawvitaVE 9xs8khQIU9s/+4o92zg0gQgI3vYVVStwkwGOR5LwsGW6Ra3nMCF6/YvVd3xndV5t UoTnr17eZSgNgOfOgGY/vAUJy0pyP42C+b+oUkoZ =6Fpi -----END PGP SIGNATURE-----