Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-37164: Vulnerability in Hewlett Packard Enterprise (HPE) HPE OneView

0
Critical
VulnerabilityCVE-2025-37164cvecve-2025-37164
Published: Tue Dec 16 2025 (12/16/2025, 16:30:34 UTC)
Source: CVE Database V5
Vendor/Project: Hewlett Packard Enterprise (HPE)
Product: HPE OneView

Description

A remote code execution issue exists in HPE OneView.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 06:40:38 UTC

Technical Analysis

CVE-2025-37164 is a critical remote code execution (RCE) vulnerability identified in Hewlett Packard Enterprise's HPE OneView, a widely used infrastructure management platform. The vulnerability is linked to CWE-94, indicating improper control over code generation, which typically involves unsafe evaluation or execution of user-supplied input. This flaw allows an unauthenticated attacker to remotely execute arbitrary code on the affected system without requiring any user interaction, making it highly exploitable. The CVSS v3.1 base score is 10.0, reflecting the highest severity due to its network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and complete impact on confidentiality, integrity, and availability (C:H/I:H/A:H). The vulnerability affects HPE OneView versions indicated as '0' in the data, which likely means all current versions or an unspecified range. HPE OneView is critical for managing data center infrastructure, including servers, storage, and networking components, making this vulnerability particularly dangerous as it could lead to full control over the management platform and downstream systems. Currently, no patches or mitigations have been officially released, and no known exploits are reported in the wild, but the critical nature demands urgent attention. The vulnerability was reserved in April 2025 and published in December 2025, indicating a recent discovery. The lack of authentication and user interaction requirements significantly lowers the barrier for exploitation, increasing the risk of widespread attacks once exploit code becomes available.

Potential Impact

The impact of CVE-2025-37164 is severe and far-reaching for organizations worldwide using HPE OneView. Successful exploitation can lead to complete system compromise, allowing attackers to execute arbitrary code remotely, potentially gaining control over the entire infrastructure management environment. This can result in unauthorized access to sensitive data, disruption of critical infrastructure operations, manipulation or destruction of configuration data, and denial of service. Given HPE OneView's role in managing data center hardware, attackers could pivot to other connected systems, amplifying the damage. The vulnerability threatens confidentiality, integrity, and availability simultaneously, posing risks to business continuity, regulatory compliance, and operational security. Organizations with internet-facing HPE OneView instances or insufficient network segmentation are particularly vulnerable. The absence of patches increases the urgency for interim mitigations to prevent exploitation. If exploited in critical sectors such as finance, healthcare, government, or telecommunications, the consequences could include significant financial losses, reputational damage, and national security risks.

Mitigation Recommendations

1. Immediately isolate HPE OneView management interfaces from public networks to reduce exposure. 2. Implement strict network segmentation and firewall rules to restrict access to HPE OneView to trusted administrative networks only. 3. Monitor network traffic and system logs for unusual activity indicative of exploitation attempts, such as unexpected code execution or unauthorized access patterns. 4. Employ intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous behavior related to HPE OneView. 5. Regularly back up HPE OneView configurations and related infrastructure data to enable recovery in case of compromise. 6. Engage with Hewlett Packard Enterprise for updates and apply security patches immediately upon release. 7. Consider deploying virtual patching or application-layer firewalls that can block exploit attempts targeting CWE-94 vulnerabilities. 8. Conduct internal audits and penetration testing focused on HPE OneView to identify and remediate potential attack vectors. 9. Educate IT and security teams about the vulnerability specifics and response procedures. 10. Prepare incident response plans tailored to potential exploitation scenarios involving HPE OneView.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hpe
Date Reserved
2025-04-16T01:28:25.375Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69418d769050fe8508ffb2fe

Added to database: 12/16/2025, 4:48:54 PM

Last enriched: 2/27/2026, 6:40:38 AM

Last updated: 3/23/2026, 11:33:13 PM

Views: 206

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses