CVE-2025-37147
BaseFortify
Publication date: 2025-10-14
Last updated on: 2025-10-14
Assigner: Hewlett Packard Enterprise (HPE)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a Secure Boot Bypass in certain Access Points that allows an attacker to circumvent the hardware root of trust verification. This verification normally ensures that only firmware signed by the vendor can run on the device. Exploiting this flaw, an attacker can run modified or custom firmware on the affected Access Points.
How can this vulnerability impact me? :
By exploiting this vulnerability, an attacker can run unauthorized firmware on your Access Points, potentially compromising the device's integrity and security. This could lead to unauthorized control, data interception, or disruption of network services.