First published: Tue Mar 18 2025(Updated: )
A vulnerability has been identified in the port ACL functionality of AOS-CX software running on the HPE Aruba Networking CX 9300 Switch Series only and affects: - AOS-CX 10.14.xxxx : All patches - AOS-CX 10.15.xxxx : 10.15.1000 and below The vulnerability is specific to traffic originated by the CX 9300 switch platform and could allow an attacker to bypass ACL rules applied to routed ports on egress. As a result, port ACLs are not correctly enforced, which could lead to unauthorized traffic flow and violations of security policies. Egress VLAN ACLs and Routed VLAN ACLs are not affected by this vulnerability.
Credit: security-alert@hpe.com
Affected Software | Affected Version | How to fix |
---|---|---|
HPE AOS-CX | >=10.14.0<10.15.0<=10.15.1000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-25040 is classified as a high severity vulnerability affecting specific versions of HPE AOS-CX software.
To fix CVE-2025-25040, upgrade to HPE AOS-CX versions higher than 10.15.1000 or later patches in the 10.14.xxxx series.
CVE-2025-25040 specifically impacts the HPE Aruba Networking CX 9300 Switch Series running affected versions of AOS-CX software.
CVE-2025-25040 affects the port ACL functionality within the HPE AOS-CX software.
If using an affected version, it is critical to immediately plan and implement an upgrade to mitigate the risk posed by CVE-2025-25040.