A critical HPE OneView flaw is being exploited in the wild – here’s everything we know so far
HPE customers are advised to upgrade to the latest version immediately
The US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning over a maximum-severity HPE OneView vulnerability which is being actively exploited in the wild.
Tracked as CVE-2025-37164, this is a code injection vulnerability within an unsecured REST API endpoint, the security agency noted, allowing a remote unauthenticated user to perform remote code execution.
HPE OneView is a centralized infrastructure management platform designed to streamline IT operations. It's widely used to deploy, monitor, and manage HPE data center hardware and software from a single global dashboard.
CVE-2025-37164 was first discovered last year by security researcher Nguyen Quoc Khanh, with HPE releasing hotfixes on December 16, 2025.
However, soon after, Rapid7 researchers released a proof-of-concept exploit that would be relatively easy for less-skilled attackers to exploit, and that would potentially grant full control of affected environments.
“OneView sits at a privileged control plane for enterprise infrastructure, so successful exploitation isn’t just about establishing remote code execution, it’s about gaining centralized control over servers, firmware, and lifecycle management at scale,” Rapid7 researchers explained.
“Management platforms are often deployed deep inside the network with broad privileges and minimal monitoring because they’re ‘supposed’ to be trusted."
Sign up today and you will receive a free copy of our Future Focus 2025 report - the leading guidance on AI, cybersecurity and other IT challenges as per 700+ senior executives
What to do about the HPE OneView vulnerability
Conor Agnew, head of compliance operations at Closed Door Security, described the CVE as a “very serious vulnerability given the access that OneView has into systems”.
"When attackers exploit this vulnerability, it essentially hands them the keys to the kingdom, where they look trusted, but can have unfiltered access deep into corporate environments to steal data or execute further attacks,” he noted.
CISA advises that when an unauthenticated RCE is detected, defenders should treat it as an assumed-breach scenario, patch immediately, and review access paths and segmentation.
They should prioritize upgrading to version 11.0 or applying the emergency hotfixes - HPE OneView virtual appliance hotfix and HPE Synergy hotfix - as soon as possible, the security agency added.
As feared, the vulnerability has now been exploited in the wild, with CISA adding it to its Known Exploited Vulnerabilities list.
Federal Civilian Executive Branch (FCEB) agencies have been given three weeks to secure their systems.
"Any organizations using the platform should take steps to mitigate the vulnerability as a priority. According to HPE, there are no workaround or mitigations for the vulnerability, so upgrading to the last version of OneView is required to protect against the CVE," Agnew said.
“Organizations are advised to action this as quickly as possible."
FOLLOW US ON SOCIAL MEDIA
Make sure to follow ITPro on Google News to keep tabs on all our latest news, analysis, and reviews.
You can also follow ITPro on LinkedIn, X, Facebook, and BlueSky.
Emma Woollacott is a freelance journalist writing for publications including the BBC, Private Eye, Forbes, Raconteur and specialist technology titles.
-
Microsoft is shaking up GitHub in preparation for a battle with AI coding rivalsNews The tech giant is bracing itself for a looming battle in the AI coding space
-
NinjaOne gearing for 2026 growth after record fiscal yearNews A record-breaking 2025 at NinjaOne saw the company outpace the market with almost 70% year-over-year revenue growth
-
HPE alerts affected staff after Midnight Blizzard breachNews HPE has notified staff affected in a data breach that sensitive personal information, including credit card details, may have been exposed.
-
HPE confirms data breach probe after IntelBroker claimsNews IntelBroker claims to have stolen HPE source code in the breach
-
The Gorilla Guide to... How HPE ProLiant Gen11 servers deliver trusted securityWhitepaper How systems, software, and connections are protected
-
Securing your network in every direction with zero trustWhitepaper Webinar on the evolution of network security
-
Do more with less: Optimizing servers with HPE to maximize VMware licensingWhitepaper Your trusted guide through the changes in the virtualization market
-
The impact of generative AI on businessWhitepaper Optimal and speedy GenAI computing performance
-
Fortify your future with HPE ProLiant Servers powered by IntelWhitepaper Enhance your security and manage your servers more effectively
-
Getting value from generative AIWhitepaper Become more productive and pursue innovation
