Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
Crowdstrike 320×100
Banner Ancharia Desktop 1 1
HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks

HPE OneView Critical Vulnerability Exploited: Update Now to Prevent Attacks

9 January 2026 15:32

The Cybersecurity and Infrastructure Security Agency (CISA) of the United States of America has raised the alarm about the active exploitation of a critical vulnerability in HPE OneView , an IT infrastructure management system from Hewlett Packard Enterprise.

The issue was discovered by Vietnamese security researcher Nguyen Quoc Hanh (brocked200). HPE released patches in mid-December, but CISA now confirms that some systems remain vulnerable and are being exploited by attackers.

HPE reported on December 16 that the flaw allows unauthenticated remote code execution. However, there are no workarounds to mitigate the risk. The only protection is to update OneView to version 11.00 or later, available through the official HPE download center.

OneView is used for centralized administration of servers, storage systems, and networking equipment. The vulnerability, identified as CVE-2025-37164, has the highest severity rating and is already being exploited by attackers in real-world attacks.

The CVE-2025-37164 vulnerability affects all versions of OneView up to and including 11.00. The vulnerability allows an unauthorized remote attacker to execute arbitrary code on the server. The attack requires little preparation and relies on code injection via management interfaces.

Following confirmation of exploitation, CISA added the vulnerability to its catalog of actively exploited security vulnerabilities. In accordance with BOD 22-01, U.S. federal civilian agencies are required to patch it within three weeks, by January 28. While the requirement formally applies only to government agencies, the agency strongly recommends all organizations, including the private sector, install the patches immediately.

CISA emphasizes that such vulnerabilities regularly provide easy entry points for attacks and pose a serious threat to large infrastructures. If patching is not possible, the agency recommends carefully following the vendor’s recommendations for cloud environments or temporarily discontinuing use of the product.

This isn’t the first alarming incident for HPE in recent times. In July, the company raised the alarm about hard-coded credentials in Aruba Instant On access points that allowed authentication bypasses. A month earlier, HPE fixed eight vulnerabilities in its StoreOnce backup system, including several flaws that could allow remote code execution and a critical security bypass.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The editorial staff of Red Hot Cyber is composed of IT and cybersecurity professionals, supported by a network of qualified sources who also operate confidentially. The team works daily to analyze, verify, and publish news, insights, and reports on cybersecurity, technology, and digital threats, with a particular focus on the accuracy of information and the protection of sources. The information published is derived from direct research, field experience, and exclusive contributions from national and international operational contexts.