Critical HPE OneView Vulnerability Exposes Systems to Remote Code Execution
A critical security vulnerability has been identified in Hewlett Packard Enterprise’s (HPE) OneView software, potentially allowing unauthenticated remote attackers to execute arbitrary code on affected systems. This flaw, designated as CVE-2025-37164, carries the highest possible severity rating with a CVSS score of 10.0, indicating an urgent need for remediation.
Understanding the Vulnerability
HPE OneView is an integrated IT infrastructure management platform designed to streamline the management of computing, storage, and networking resources. The identified vulnerability affects all versions of HPE OneView prior to v11.00. Exploitation of this flaw does not require user interaction or special access privileges, making it particularly dangerous as it can be executed over the network with minimal effort.
The CVSS vector string for this vulnerability is CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H. This notation indicates that the attack is network-based (AV:N), has low attack complexity (AC:L), requires no privileges (PR:N), and no user interaction (UI:N). The scope (S:C) suggests that the impact extends beyond the vulnerable component, with high consequences for confidentiality (C:H), integrity (I:H), and availability (A:H).
Potential Impact
The exploitation of CVE-2025-37164 poses significant risks to organizations utilizing affected versions of HPE OneView. Potential impacts include:
– Unauthorized Access: Attackers could gain control over the OneView management interface, allowing them to manipulate infrastructure configurations.
– Data Breach: Sensitive information managed by OneView could be accessed or exfiltrated.
– System Disruption: Malicious actors might disrupt operations by altering system settings or deploying harmful code.
Given the critical nature of this vulnerability, immediate action is required to mitigate potential threats.
Recommended Actions
HPE has released OneView version 11.00 to address this security flaw. Organizations are strongly advised to:
1. Upgrade to OneView v11.00 or Later: Access the My HPE Software Center portal to download and install the latest version of OneView. This upgrade resolves the identified vulnerability and enhances overall system security.
2. Apply Security Hotfixes: For organizations operating OneView versions 5.20 through 10.20, HPE provides dedicated security hotfixes. These can be obtained through HPE’s support channels. It’s important to note that after upgrading from HPE OneView 6.60.xx to 7.00.00, including HPE Synergy Composer reimage operations, the security hotfix must be reapplied.
3. Implement Network Segmentation: If immediate upgrading is not feasible, organizations should implement network segmentation to restrict access to HPE OneView systems. This measure can help contain potential exploitation attempts.
4. Monitor for Suspicious Activity: Regularly review system logs and network traffic for signs of unauthorized access or anomalies that may indicate exploitation attempts.
Disclosure and Reporting
The vulnerability was responsibly disclosed by security researcher brocked200 (Nguyen Quoc Khanh) on December 16, 2025. HPE has acknowledged the report and provided the necessary updates to address the issue.
Conclusion
The discovery of CVE-2025-37164 underscores the importance of proactive security measures and timely software updates. Organizations utilizing HPE OneView must prioritize upgrading to the latest version to protect their infrastructure from potential exploitation. Regular system management and security procedure reviews are essential to maintain the integrity and security of IT environments.