CVE-2025-37095: Vulnerability in Hewlett Packard Enterprise (HPE) HPE StoreOnce Software
A directory traversal information disclosure vulnerability exists in HPE StoreOnce Software.
AI Analysis
Technical Summary
CVE-2025-37095 is a directory traversal vulnerability identified in Hewlett Packard Enterprise's (HPE) StoreOnce Software. This vulnerability allows an attacker with high privileges (PR:H) to perform directory traversal attacks, potentially leading to unauthorized disclosure of sensitive information stored on the system. The vulnerability is classified under CWE-22, which involves improper sanitization of file path inputs, enabling attackers to access files and directories outside the intended scope. The CVSS 4.0 base score is 5.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges and no user interaction. The vulnerability impacts confidentiality (VC:H) but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected version is listed as '0', which likely indicates an unspecified or initial version of the software. StoreOnce Software is used primarily for backup and data deduplication solutions, often deployed in enterprise environments to optimize storage and data protection workflows.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized information disclosure within backup infrastructure environments. Since StoreOnce Software manages backup data, exploitation could lead to exposure of sensitive corporate or customer data, potentially violating data protection regulations such as GDPR. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised administrative credentials, but once exploited, the confidentiality breach could be significant. This could undermine trust in backup integrity and lead to compliance issues, financial penalties, and reputational damage. Organizations relying heavily on HPE StoreOnce for critical backup operations may face increased risk if this vulnerability is exploited, especially in sectors with stringent data privacy requirements such as finance, healthcare, and government.
Mitigation Recommendations
Given the absence of an official patch at this time, European organizations should implement compensating controls immediately. These include restricting administrative access to StoreOnce management interfaces through network segmentation and strict access control lists (ACLs), enforcing multi-factor authentication (MFA) for all privileged accounts, and monitoring logs for unusual directory access patterns indicative of traversal attempts. Regular audits of user privileges should be conducted to minimize the number of high-privilege accounts. Additionally, organizations should prepare for rapid deployment of patches once available by maintaining an up-to-date asset inventory and testing patch deployment procedures in advance. Employing intrusion detection systems (IDS) with signatures or heuristics for directory traversal attempts can provide early warning. Finally, encrypting backup data at rest and in transit can reduce the impact of potential data disclosure.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Italy
CVE-2025-37095: Vulnerability in Hewlett Packard Enterprise (HPE) HPE StoreOnce Software
Description
A directory traversal information disclosure vulnerability exists in HPE StoreOnce Software.
AI-Powered Analysis
Technical Analysis
CVE-2025-37095 is a directory traversal vulnerability identified in Hewlett Packard Enterprise's (HPE) StoreOnce Software. This vulnerability allows an attacker with high privileges (PR:H) to perform directory traversal attacks, potentially leading to unauthorized disclosure of sensitive information stored on the system. The vulnerability is classified under CWE-22, which involves improper sanitization of file path inputs, enabling attackers to access files and directories outside the intended scope. The CVSS 4.0 base score is 5.9, indicating a medium severity level. The attack vector is network-based (AV:N), with low attack complexity (AC:L), but requires high privileges and no user interaction. The vulnerability impacts confidentiality (VC:H) but does not affect integrity or availability. No known exploits are currently reported in the wild, and no patches have been linked yet. The affected version is listed as '0', which likely indicates an unspecified or initial version of the software. StoreOnce Software is used primarily for backup and data deduplication solutions, often deployed in enterprise environments to optimize storage and data protection workflows.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized information disclosure within backup infrastructure environments. Since StoreOnce Software manages backup data, exploitation could lead to exposure of sensitive corporate or customer data, potentially violating data protection regulations such as GDPR. The requirement for high privileges limits the attack surface to insiders or attackers who have already compromised administrative credentials, but once exploited, the confidentiality breach could be significant. This could undermine trust in backup integrity and lead to compliance issues, financial penalties, and reputational damage. Organizations relying heavily on HPE StoreOnce for critical backup operations may face increased risk if this vulnerability is exploited, especially in sectors with stringent data privacy requirements such as finance, healthcare, and government.
Mitigation Recommendations
Given the absence of an official patch at this time, European organizations should implement compensating controls immediately. These include restricting administrative access to StoreOnce management interfaces through network segmentation and strict access control lists (ACLs), enforcing multi-factor authentication (MFA) for all privileged accounts, and monitoring logs for unusual directory access patterns indicative of traversal attempts. Regular audits of user privileges should be conducted to minimize the number of high-privilege accounts. Additionally, organizations should prepare for rapid deployment of patches once available by maintaining an up-to-date asset inventory and testing patch deployment procedures in advance. Employing intrusion detection systems (IDS) with signatures or heuristics for directory traversal attempts can provide early warning. Finally, encrypting backup data at rest and in transit can reduce the impact of potential data disclosure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- hpe
- Date Reserved
- 2025-04-16T01:28:25.363Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683dca2c182aa0cae24b06af
Added to database: 6/2/2025, 3:58:36 PM
Last enriched: 7/11/2025, 8:04:35 AM
Last updated: 7/31/2025, 1:54:46 AM
Views: 18
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.