Categories: Cyber Security News

HPE OneView Software Vulnerability Allows Remote Code Execution

Hewlett Packard Enterprise has released a critical security bulletin addressing a severe vulnerability in HPE OneView Software that could allow remote attackers to execute arbitrary code without authentication.

The vulnerability, tracked as CVE-2025-37164, affects all versions of HPE OneView before version 11.00 and poses an immediate risk to enterprise infrastructure management systems.

The flaw exists in the HPE OneView application framework and can be exploited by unauthenticated remote users to gain complete control over affected systems.

The vulnerability carries a maximum CVSS severity score of 10.0, indicating critical risk with no authentication requirements and network-accessible attack vectors.

HPE acknowledges the security researcher Brock200 (Nguyen Quoc Khanh) for discovering and responsibly reporting this vulnerability.

HPE has released comprehensive patches to resolve the security issue. Organizations running HPE OneView version 11.00 or later are protected against this vulnerability.

For users on earlier versions between 5.20 and 10.20, HPE provides security hotfixes available through their software center and support portals.

The fixes include both virtual appliance security hotfixes and HPE Synergy Composer security patches tailored for different deployment scenarios.

Enterprise customers should prioritize updating to the patched versions immediately, particularly those with public-facing OneView instances or multi-tenant environments.

Organizations unable to upgrade immediately must implement the security hotfixes and apply appropriate network segmentation to minimize exposure.

Security teams should review their OneView deployments and initiate patch management workflows without delay.

Vulnerability Detail Information
CVE Identifier CVE-2025-37164
Bulletin ID HPESBGN04985 rev.1
Attack Vector Network (AV:N)
Authentication Required None (PR:N)
Attack Complexity Low (AC:L)
User Interaction Not Required (UI:N)
Impact Scope Changed (S:C)
Confidentiality Impact High (C:H)
Integrity Impact High (I:H)
Availability Impact High (A:H)
CVSS v3.1 Score 10.0 (Critical)
Affected Versions All versions prior to v11.00
Fixed Version v11.00 and later
Release Date December 16, 2025
Reporter brocked200 (Nguyen Quoc Khanh)

The bulletin recommends that all users determine the applicability of this information to their infrastructure and take appropriate patching actions.

HPE provides security hotfixes for OneView versions 5.20 through 10.20 via their enterprise license portal and official support channels.

Find this Story Interesting! Follow us on Google NewsLinkedIn, and X to Get More Instant Updates.

The post HPE OneView Software Vulnerability Allows Remote Code Execution appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Responsive & Touch-enabled Range Slider In Vanilla JavaScript – rangeSlider

rangeSlider is a pure Vanilla JavaScript library that converts regular Html5 range inputs into responsive,…

17 minutes ago

Animate Scrolling To Anchor Links – scrollToSmooth

Just another pure JS smooth scroll library to animate the page scrolling to specified anchor…

17 minutes ago

Screamer Review

Screamer isn’t subtle. Screamer is neon-soaked, maximum volume arcade racing that requires both the finesse…

26 minutes ago

Weekend Weather: JUST SHY of the record…

Weekend Weather: JUST SHY of the record...

2 hours ago

MY TAKE: As RSAC 2026 opens, AI has bifurcated cybersecurity into two wars—the clock is running

SAN FRANCISCO — RSAC 2026 opens here Monday at Moscone Center, with upwards of 40,000…

3 hours ago

Beyond Raw Generation: How Creative Fabrica Studio is Solving the Stylistic Consistency Problem in Neural Art

The generative AI landscape has moved past its “novelty” phase. While the industry spent 2023…

4 hours ago

This website uses cookies.