Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37149: Vulnerability in Hewlett Packard Enterprise (HPE) ProLiant RL300 Gen11 Server

0
Medium
VulnerabilityCVE-2025-37149cvecve-2025-37149
Published: Tue Oct 14 2025 (10/14/2025, 15:55:23 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: ProLiant RL300 Gen11 Server

Description

A potential out-of-bound reads vulnerability in HPE ProLiant RL300 Gen11 Server's UEFI firmware.

AI-Powered Analysis

AILast updated: 10/14/2025, 16:15:28 UTC

Technical Analysis

CVE-2025-37149 is a vulnerability identified in the UEFI firmware of Hewlett Packard Enterprise's ProLiant RL300 Gen11 Server. The flaw is characterized as an out-of-bound read, which means that the firmware improperly accesses memory outside the intended buffer boundaries. This can lead to the disclosure of sensitive information stored in adjacent memory regions. The vulnerability requires local access with high privileges (PR:H), indicating that an attacker must already have significant control over the system to exploit it. No user interaction is needed, and the vulnerability affects confidentiality (C:H) but does not impact integrity or availability. The scope is classified as changed (S:C), meaning the vulnerability can affect resources beyond the initially vulnerable component. The CVSS v3.1 base score is 6.0, reflecting a medium severity level. No known exploits are currently in the wild, and no patches have been publicly released at the time of publication. The vulnerability resides in the UEFI firmware, a critical component responsible for system initialization and hardware abstraction, making it a sensitive attack surface. Exploiting this flaw could allow an attacker to read sensitive firmware or system data, potentially aiding further attacks or information gathering. Given the requirement for local high-privilege access, the attack vector is limited to insiders or attackers who have already compromised the system to some extent.

Potential Impact

For European organizations, especially those operating data centers, cloud services, or critical infrastructure using HPE ProLiant RL300 Gen11 Servers, this vulnerability poses a risk of sensitive data leakage from firmware memory. Although exploitation requires local high privileges, the confidentiality breach could facilitate further attacks or expose cryptographic keys, configuration data, or other sensitive information stored in firmware memory. This could undermine trust in system integrity and confidentiality, impacting sectors such as finance, government, healthcare, and telecommunications. The lack of availability or integrity impact reduces the risk of service disruption but does not eliminate the threat of espionage or data exfiltration. Organizations relying heavily on these servers for virtualization or secure workloads may face increased risk. The absence of known exploits and patches means organizations must proactively monitor and restrict access to vulnerable systems to prevent privilege escalation and lateral movement by attackers.

Mitigation Recommendations

1. Enforce strict access control policies to limit local administrative access to trusted personnel only. 2. Implement robust monitoring and logging of privileged user activities on affected servers to detect suspicious behavior early. 3. Isolate critical systems running HPE ProLiant RL300 Gen11 Servers from less secure network segments to reduce the risk of local exploitation. 4. Apply firmware updates and patches from Hewlett Packard Enterprise as soon as they become available to remediate the vulnerability. 5. Conduct regular security audits and vulnerability assessments focusing on firmware and hardware components. 6. Employ hardware-based security features such as TPM and secure boot to enhance firmware integrity. 7. Use endpoint detection and response (EDR) solutions capable of detecting anomalous local privilege escalations or memory access patterns. 8. Educate system administrators about the risks of local privilege misuse and the importance of maintaining firmware security hygiene.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.369Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ee73a175ce224a042d3465

Added to database: 10/14/2025, 4:00:33 PM

Last enriched: 10/14/2025, 4:15:28 PM

Last updated: 10/14/2025, 10:04:08 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats