CVE-2025-37095: Vulnerability in Hewlett Packard Enterprise (HPE) HPE StoreOnce Software
A directory traversal information disclosure vulnerability exists in HPE StoreOnce Software.
AI Analysis
Technical Summary
CVE-2025-37095 is a directory traversal vulnerability identified in Hewlett Packard Enterprise's (HPE) StoreOnce Software. This vulnerability allows an attacker with high privileges (PR:H) to perform directory traversal attacks, potentially leading to unauthorized disclosure of sensitive information stored on the system. The vulnerability is classified under CWE-22, which involves improper sanitization of file path inputs, enabling attackers to access files and directories outside the intended scope. The CVSS 4.0 base score is 5.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges and no user interaction. The vulnerability impacts confidentiality (VC:H) but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected version is listed as '0', which likely indicates an unspecified or initial version of the software. StoreOnce Software is used primarily for backup and data deduplication solutions, often deployed in enterprise environments to optimize storage and data protection workflows.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized information disclosure within backup infrastructure environments. Since StoreOnce Software manages backup data, exploitation could lead to exposure of sensitive corporate or customer data, potentially violating data protection regulations such as GDPR. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised administrative credentials, but once exploited, the confidentiality breach could be significant. This could undermine trust in backup integrity and lead to compliance issues, financial penalties, and reputational damage. Organizations relying heavily on HPE StoreOnce for critical backup operations may face increased risk if this vulnerability is exploited, especially in sectors with stringent data privacy requirements such as finance, healthcare, and government.
Mitigation Recommendations
Given the absence of an official patch at this time, European organizations should implement compensating controls immediately. These include restricting administrative access to StoreOnce management interfaces through network segmentation and strict access control lists (ACLs), enforcing multi-factor authentication (MFA) for all privileged accounts, and monitoring logs for unusual directory access patterns indicative of traversal attempts. Regular audits of user privileges should be conducted to minimize the number of high-privilege accounts. Additionally, organizations should prepare for rapid deployment of patches once available by maintaining an up-to-date asset inventory and testing patch deployment procedures in advance. Employing intrusion detection systems (IDS) with signatures or heuristics for directory traversal attempts can provide early warning. Finally, encrypting backup data at rest and in transit can reduce the impact of potential data disclosure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-37095: Vulnerability in Hewlett Packard Enterprise (HPE) HPE StoreOnce Software
Description
A directory traversal information disclosure vulnerability exists in HPE StoreOnce Software.
AI-Powered Analysis
Technical Analysis
CVE-2025-37095 is a directory traversal vulnerability identified in Hewlett Packard Enterprise's (HPE) StoreOnce Software. This vulnerability allows an attacker with high privileges (PR:H) to perform directory traversal attacks, potentially leading to unauthorized disclosure of sensitive information stored on the system. The vulnerability is classified under CWE-22, which involves improper sanitization of file path inputs, enabling attackers to access files and directories outside the intended scope. The CVSS 4.0 base score is 5.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges and no user interaction. The vulnerability impacts confidentiality (VC:H) but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected version is listed as '0', which likely indicates an unspecified or initial version of the software. StoreOnce Software is used primarily for backup and data deduplication solutions, often deployed in enterprise environments to optimize storage and data protection workflows.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized information disclosure within backup infrastructure environments. Since StoreOnce Software manages backup data, exploitation could lead to exposure of sensitive corporate or customer data, potentially violating data protection regulations such as GDPR. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised administrative credentials, but once exploited, the confidentiality breach could be significant. This could undermine trust in backup integrity and lead to compliance issues, financial penalties, and reputational damage. Organizations relying heavily on HPE StoreOnce for critical backup operations may face increased risk if this vulnerability is exploited, especially in sectors with stringent data privacy requirements such as finance, healthcare, and government.
Mitigation Recommendations
Given the absence of an official patch at this time, European organizations should implement compensating controls immediately. These include restricting administrative access to StoreOnce management interfaces through network segmentation and strict access control lists (ACLs), enforcing multi-factor authentication (MFA) for all privileged accounts, and monitoring logs for unusual directory access patterns indicative of traversal attempts. Regular audits of user privileges should be conducted to minimize the number of high-privilege accounts. Additionally, organizations should prepare for rapid deployment of patches once available by maintaining an up-to-date asset inventory and testing patch deployment procedures in advance. Employing intrusion detection systems (IDS) with signatures or heuristics for directory traversal attempts can provide early warning. Finally, encrypting backup data at rest and in transit can reduce the impact of potential data disclosure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hpe
- Date Reserved
- 2025-04-16T01:28:25.363Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683dca2c182aa0cae24b06af
Added to database: 6/2/2025, 3:58:36 PM
Last enriched: 7/11/2025, 8:04:35 AM
Last updated: 11/22/2025, 9:02:18 PM
Views: 36
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
China-Linked APT31 Launches Stealthy Cyberattacks on Russian IT Using Cloud Services
MediumCVE-2025-2655: SQL Injection in SourceCodester AC Repair and Services System
MediumCVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.