HPE Patches Maximum-Severity OneView RCE Vulnerability
CVE-2025-37164 allows unauthenticated remote code execution against HPE OneView infrastructure management platforms running versions prior to 11.00.
Hewlett Packard Enterprise has released patches for a maximum-severity vulnerability in HPE OneView that allows unauthenticated attackers to achieve remote code execution on affected infrastructure management systems. Organizations using OneView should prioritize immediate updates.
TL;DR
- What happened: HPE disclosed CVE-2025-37164, a critical RCE vulnerability in OneView infrastructure management software
- Who's affected: All HPE OneView deployments running versions prior to 11.00
- Severity: Critical (CVSS 10.0) - Unauthenticated remote code execution
- Action required: Update to HPE OneView version 11.00 or later immediately
What is CVE-2025-37164?
CVE-2025-37164 is a critical security vulnerability in HPE OneView Software that enables remote, unauthenticated attackers to execute arbitrary code on vulnerable systems. The flaw received the maximum CVSS score of 10.0, reflecting the combination of remote exploitation, no authentication requirement, and complete system compromise capability.
According to HPE's security advisory: "A potential security vulnerability has been identified in HPE OneView that could be exploited, allowing a remote unauthenticated user to perform remote code execution."
The vulnerability affects all HPE OneView versions prior to 11.00.
What is HPE OneView?
HPE OneView is an infrastructure management platform that provides unified management of servers, storage, and networking equipment in enterprise data centers. It serves as a central control plane for physical and virtual infrastructure, offering:
- Automated provisioning: Streamlined deployment of compute, storage, and network resources
- Template-based management: Consistent configuration across infrastructure components
- Health monitoring: Real-time visibility into hardware status and performance
- Firmware management: Coordinated updates across infrastructure components
Given its role managing critical data center infrastructure, compromising OneView could provide attackers with extensive control over enterprise IT environments.
Why This Matters
Infrastructure management platforms like OneView occupy uniquely privileged positions in enterprise environments. They maintain credentials and access to manage servers, storage arrays, and network equipment—the core components of data center operations.
Successful exploitation of CVE-2025-37164 could enable attackers to:
- Compromise managed infrastructure: Use OneView's management credentials to access servers, storage, and networking equipment
- Disrupt operations: Modify configurations or take actions that impact business-critical systems
- Establish persistence: Deploy backdoors across managed infrastructure
- Exfiltrate data: Access sensitive information stored on or processed by managed systems
- Enable lateral movement: Pivot from OneView to other systems within the data center
The unauthenticated nature of the vulnerability is particularly concerning—attackers do not need valid credentials or any prior access to exploit it.
Patching and Remediation
Unlike some recent critical vulnerabilities, HPE has released a patch addressing CVE-2025-37164. Organizations should update to HPE OneView version 11.00 or later to remediate the vulnerability.
Recommended Actions
- Inventory OneView deployments across your environment to identify all instances requiring updates
- Prioritize patching based on network exposure—internet-facing or DMZ instances should be updated first
- Review network segmentation to ensure OneView systems are not unnecessarily exposed
- Monitor for exploitation attempts by reviewing logs for suspicious activity
- Implement defense in depth by restricting network access to OneView management interfaces
Pre-Patch Risk Reduction
For organizations unable to patch immediately, consider these temporary mitigations:
- Network isolation: Restrict access to OneView management interfaces to authorized administrator workstations only
- Firewall rules: Implement strict ingress filtering to limit which systems can communicate with OneView
- Monitoring: Deploy enhanced logging and alerting to detect potential exploitation attempts
- Backup verification: Ensure current, tested backups exist to enable recovery if compromise occurs
However, these measures are not substitutes for patching. The severity of this vulnerability warrants prioritizing the update.
Enterprise Infrastructure Security
This vulnerability highlights the critical importance of securing infrastructure management platforms. These systems often receive less security attention than application servers or user endpoints, yet their compromise can have cascading effects across the entire IT environment.
Security teams should ensure infrastructure management systems:
- Receive regular patching attention equal to other critical systems
- Are segmented from general network traffic
- Implement strong authentication and access controls
- Generate comprehensive audit logs
- Are included in vulnerability scanning programs
Frequently Asked Questions
Is my OneView instance vulnerable? If you are running HPE OneView version prior to 11.00, your system is vulnerable. Check your installed version through the OneView administration interface or contact HPE support for assistance.
What should I do first? Download and apply the update to HPE OneView version 11.00 immediately. This is the definitive fix for CVE-2025-37164.
Are there indicators of compromise I should look for? Monitor OneView logs for unusual authentication attempts, unexpected API calls, or signs of configuration changes you did not authorize. HPE's advisory may include additional detection guidance.
HPE's security advisory provides complete technical details and update instructions for affected organizations.
Related Articles
Coolify Command Injection Flaws Grant Root Access
Five critical vulnerabilities in the self-hosting platform allow authenticated users to execute arbitrary commands as root. Over 52,000 instances are exposed globally.
Jan 10, 2026CISA Adds 16-Year-Old PowerPoint Flaw to Exploited List
January 7 KEV update includes CVE-2009-0556 from 2009 alongside recently patched HPE OneView vulnerability. Both are seeing active exploitation.
Jan 8, 2026n8n 'Ni8mare' Flaw Allows Unauthenticated Server Takeover
CVE-2026-21858 scores CVSS 10.0 and requires no credentials to exploit. Attackers can read files, forge admin sessions, and execute commands.
Jan 8, 2026Chrome Patches High-Severity WebView Policy Bypass
CVE-2026-0628 allowed malicious extensions to inject scripts into privileged pages through insufficient policy enforcement. Update to Chrome 143.0.7499.192.
Jan 7, 2026