
Cybersecurity is a serious issue, especially when it comes to vulnerabilities that can compromise an entire system. Well, Hewlett Packard Enterprise (HPE) has just raised the alarm about a truly worrying security flaw in its flagship software, OneView .
This vulnerability, identified as CVE-2025-37164, has a maximum CVSS score of 10.0, meaning it’s a very critical bug. In short, failing to update your systems puts you at significant risk, and this is recommended before cybercriminals can gain access to your systems and cause cybersecurity incidents.
OneView is the brains of data centers, managing servers, storage, and networking, and is the automation engine for hybrid cloud environments. So, if an unauthenticated user can execute remote code, we’re in serious trouble. It’s time to take this vulnerability seriously and understand what’s happening.
The bug allows remote code execution (RCE) by a completely unauthenticated user. According to the advisory, the flaw allows a remote attacker to execute arbitrary code without having to log in. In practical terms, this means an attacker could take control of the management appliance from the entire network without stealing any credentials.
Once inside, it could potentially disrupt operations, distribute ransomware, or manipulate the physical hardware managed by the software . This vulnerability affects HPE OneView – All versions prior to v11.00. HPE has released an urgent fix and advises all customers to take immediate action.
The primary solution is to completely update the software. “Hewlett Packard Enterprise OneView v11.00 or later addresses this vulnerability,” the company stated. Administrators can download the update through My HPE Software Center or HPE Synergy Software Releases.
For organizations running older versions (5.20 to 10.20) who are unable to immediately upgrade to version 11.00, HPE has made an urgent security fix available. However, installing this patch requires a critical step that, if ignored, could put the system at risk. HPE experts emphasize that the security fix does not persist after some updates.
Specifically, the security fix must be reinstalled after upgrading the appliance from HPE OneView version 6.60.xx to version 7.00.00, including any HPE Synergy Composer reimages.
Administrators are advised to check version numbers and apply patches urgently, as a CVSS 10 vulnerability is often a top priority for ransomware groups and state-sponsored actors.
Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.
