Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37093: Vulnerability in Hewlett Packard Enterprise (HPE) HPE StoreOnce Software

0
Critical
VulnerabilityCVE-2025-37093cvecve-2025-37093
Published: Mon Jun 02 2025 (06/02/2025, 13:56:18 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: HPE StoreOnce Software

Description

An authentication bypass vulnerability exists in HPE StoreOnce Software.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 21:28:41 UTC

Technical Analysis

CVE-2025-37093 is an authentication bypass vulnerability identified in Hewlett Packard Enterprise's StoreOnce Software, a widely used data backup and deduplication solution. The vulnerability allows attackers to circumvent authentication controls entirely, granting them unauthorized access to the system without requiring any privileges or user interaction. The CVSS 3.1 base score of 9.8 reflects the critical severity, with attack vector being network-based (AV:N), no attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact scope is universal (S:U), affecting confidentiality, integrity, and availability to a high degree (C:H/I:H/A:H). The underlying weakness is classified as CWE-287, indicating improper authentication mechanisms that fail to verify user credentials correctly. This flaw could enable attackers to access sensitive backup data, manipulate stored information, or disrupt backup services, potentially causing significant operational and data loss consequences. Although no public exploits have been reported yet, the vulnerability's characteristics make it highly exploitable. The affected product, HPE StoreOnce Software, is critical in enterprise backup infrastructures, making this vulnerability a high-priority security concern.

Potential Impact

The impact of CVE-2025-37093 is severe for organizations relying on HPE StoreOnce Software for backup and data protection. Successful exploitation can lead to unauthorized access to backup repositories, exposing sensitive and confidential data to attackers. This can result in data theft, tampering, or deletion, undermining data integrity and availability. The disruption of backup services can impair disaster recovery capabilities, increasing downtime and operational risk. Enterprises may face regulatory compliance violations due to data breaches, leading to financial penalties and reputational damage. Given the critical nature of backup data, attackers could leverage this vulnerability to facilitate ransomware attacks or persistent intrusions. The ease of exploitation without authentication or user interaction broadens the attack surface, making it a significant threat to organizations globally, especially those with large-scale data storage and backup requirements.

Mitigation Recommendations

To mitigate CVE-2025-37093, organizations should immediately apply any patches or updates released by Hewlett Packard Enterprise once available. In the absence of patches, restrict network access to the HPE StoreOnce management interfaces by implementing strict firewall rules and network segmentation to limit exposure to trusted administrative networks only. Employ multi-factor authentication (MFA) at the network perimeter and for accessing backup infrastructure where possible. Monitor logs and network traffic for unusual access patterns or unauthorized login attempts targeting StoreOnce systems. Regularly audit backup configurations and access controls to ensure they follow the principle of least privilege. Consider deploying intrusion detection/prevention systems (IDS/IPS) to detect exploitation attempts. Additionally, maintain offline or immutable backup copies to safeguard against data tampering or deletion. Engage with HPE support for guidance and stay updated on advisories related to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.363Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dca2c182aa0cae24b06a7

Added to database: 6/2/2025, 3:58:36 PM

Last enriched: 2/26/2026, 9:28:41 PM

Last updated: 3/26/2026, 11:09:05 AM

Views: 98

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses