Skip to main content

CVE-2025-37112: CWE-798 Use of Hard-coded Credentials in Hewlett Packard Enterprise HPE Telco Network Function Virtual Orchestrator

Medium
VulnerabilityCVE-2025-37112cvecve-2025-37112cwe-798
Published: Thu Jul 31 2025 (07/31/2025, 19:42:04 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise
Product: HPE Telco Network Function Virtual Orchestrator

Description

A vulnerability was discovered in the storage policy for certain sets of encryption keys in the HPE Telco Network Function Virtual Orchestrator. Successful Exploitation could lead to unauthorized parties gaining access to sensitive system information.

AI-Powered Analysis

AILast updated: 07/31/2025, 20:02:42 UTC

Technical Analysis

CVE-2025-37112 is a medium severity vulnerability identified in Hewlett Packard Enterprise's (HPE) Telco Network Function Virtual Orchestrator version 7.0.0. The vulnerability is categorized under CWE-798, which pertains to the use of hard-coded credentials. Specifically, the issue arises from the storage policy for certain sets of encryption keys within the orchestrator. Hard-coded credentials embedded in software can be extracted by attackers, enabling unauthorized access to sensitive system information. In this case, successful exploitation could allow an attacker with high privileges (as indicated by the CVSS vector requiring PR:H - privileges required: high) and local access (AV:L - attack vector: local) to gain access to sensitive encryption key material. The CVSS score of 6.0 reflects a medium severity, with a significant confidentiality impact (C:H), no impact on integrity or availability, and no user interaction required. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable component. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is critical in environments where the HPE Telco Network Function Virtual Orchestrator is deployed, as it could lead to unauthorized disclosure of encryption keys, potentially compromising the confidentiality of network functions and virtualized telecom infrastructure managed by this orchestrator.

Potential Impact

For European organizations, especially telecommunications providers and network operators using HPE's Telco Network Function Virtual Orchestrator, this vulnerability poses a significant risk to the confidentiality of sensitive encryption keys that protect virtualized network functions. Unauthorized access to these keys could lead to exposure of sensitive data, interception or manipulation of network traffic, and undermining of the security assurances of virtualized network functions. Given the critical role of telecom infrastructure in national communications and digital services, exploitation could disrupt secure communications, impact customer privacy, and potentially facilitate further attacks on network infrastructure. The vulnerability's requirement for high privileges and local access somewhat limits remote exploitation but does not eliminate risk, particularly from insider threats or attackers who have already gained elevated access. The confidentiality impact is high, which is particularly concerning for compliance with European data protection regulations such as GDPR, where unauthorized disclosure of sensitive information can lead to regulatory penalties and reputational damage.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately audit their deployment of HPE Telco Network Function Virtual Orchestrator version 7.0.0 to identify affected systems. 2) Implement strict access controls and monitoring to limit local high-privilege access to trusted personnel only, reducing the risk of exploitation. 3) Employ network segmentation and isolation for systems running the orchestrator to minimize exposure. 4) Monitor system logs and conduct regular security assessments to detect any unauthorized access attempts. 5) Engage with HPE support channels to obtain any forthcoming patches or workarounds, and apply them promptly once available. 6) Consider rotating or re-issuing encryption keys managed by the orchestrator after remediation to invalidate any potentially compromised keys. 7) Enhance insider threat detection capabilities, given the local and privilege requirements for exploitation. 8) Review and update credential management policies to avoid hard-coded credentials in future deployments and configurations.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.365Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688bc861ad5a09ad00bbeacd

Added to database: 7/31/2025, 7:47:45 PM

Last enriched: 7/31/2025, 8:02:42 PM

Last updated: 8/1/2025, 1:41:18 PM

Views: 5

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats