Share This:

Cybersecurity Threat AdvisoryA newly disclosed vulnerability, tracked as CVE‑2025‑37164, affects the Hewlett Packard Enterprise (HPE) OneView product and has been assigned a CVSS score of 10.0. Read this Cybersecurity Threat Advisory for more details and recommended steps to protect your environment.

What is the threat?

CVE‑2025‑37164 is a critical remote code execution (RCE) vulnerability in HPE OneView that allows unauthenticated attackers to execute arbitrary code over the network. A successful exploitation allows threat actors to gain complete control over the OneView management platform, compromise connected servers, networking gear, and infrastructure resources, steal sensitive data or credentials, move laterally across environments, and disrupt critical operations.

Why is it noteworthy?

This flaw has a CVSS score of 10.0. The availability of a public Metasploit module makes the situation even more urgent because it dramatically lowers the skill required to launch the attack and increases the likelihood of exploitation across the internet.

What is the exposure or risk?

OneView is designed for trust and efficiency, which means it typically runs with minimal performance-impacting logging. As a result, organizations may have limited visibility during an attack. Exploitation could give attackers full control of the managed infrastructure, including firmware security keys and direct server access. High trust, broad access, and limited logging make compromises fast and silent.

What are the recommendations?

Barracuda recommends the following actions to secure your infrastructure:

  • Apply the official HPE security patch or upgrade to version 11 for all affected OneView instances.
  • Restrict network access to the OneView management interface using ACLs and by preventing any exposure to the public internet.
  • Implement strict access controls and enforce multi‑factor authentication (MFA) for all administrative accounts.
  • Monitor logs and network traffic closely for unusual activity or exploit attempts targeting OneView.
  • Review and update incident response plans to ensure rapid containment and recovery should a compromise occur.

References

For more in-depth information about the recommendations, please visit the following links:

If you have any questions about this Cybersecurity Threat Advisory, don’t hesitate to get in touch with Barracuda Managed XDR’s Security Operations Center.


Share This:
Owen Kenny

Posted by Owen Kenny

Owen is a Cybersecurity Analyst at Barracuda. He's a security expert, working on our Blue Team within our Security Operations Center. Owen supports our XDR service delivery and is highly skilled at analyzing security events to detect cyber threats, helping keep our partners and their customers protected.

Leave a reply

Your email address will not be published. Required fields are marked *

 

This site uses Akismet to reduce spam. Learn how your comment data is processed.