What is the actual problem? As far as I know, having IKEv1 Aggressive mode is not a problem by itself, only if you use PSK authentication with weak PSK.
Automated scanning tools, that many auditors use, are known to provide false positives. They detect an enabled feature or use version information to make assumptions that are not true in all circumstances. So first step is to find out if it is a real security vulnerability in this situation. If you use the certificate-based authentication with the TPM certificate, there is no way to brute-force the PSK in IKEv1 as there is no PSK in that case. As far as I see, even if you use a long-random PSK, the risk is limited.
Please first work with the auditor, and then with Aruba TAC to get a solution.
If you, or your auditors, think to have found a vulnerability, please contact the Aruba Security Incident Response team to report.