Initiativen für
Als nationale Behörde für Cybersicherheit hat das ZCB mehrere Initiativen für bestimmte Zielgruppen entwickelt, die hier vorgestellt werden.
- Last update: 17/12/2025
- Affected software:
→ HPE OneView versions prior to v11.00- Type: remote code execution
- CVE/CVSS
→ CVE-2025-37164: CVSS 10.0 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Hewlett Packard Enterprise - https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US
A critical vulnerability has been identified and patched in HPE OneView, a management tool created by Hewlett Packard Enterprise (HPE) that helps companies control and monitor their servers, storage, and network equipment from one central place.
Successful exploitation could allow remote attackers to execute arbitrary code on affected systems without any credentials or user interaction, posing an extreme risk to data centers and IT infrastructure management. This threatens confidentiality, integrity, and availability of critical data.
CVE-2025-37164 is a remote code execution (RCE) that allows attackers to execute arbitrary code remotely without any user interaction required and with the privileges of the OneView application service, which is typically high-level system access.
As a result, an attacker can also potentially compromise the entire system, gain full control over the affected HPE OneView infrastructure, access, modify, or destroy sensitive data, and even disrupt critical business operations.
The core of CVE-2025-37164 lies in a failure to properly validate or sanitize user input within a specific component of HPE OneView’s web interface or API.
Although no public exploits have been reported yet, the nature of vulnerability and the widespread use of HPE OneView make it a significant threat.
Patch
HPE has made the following software update available to resolve the vulnerability in HPE OneView.
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity and ensure a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/en/cert/report-incident.
While patching appliances or software to the newest version may protect against future exploitation, it does not remediate historic compromise.
National Vulnerability Database - https://nvd.nist.gov/vuln/detail/CVE-2025-37164
Hewlett Packard Enterprise - https://myenterpriselicense.hpe.com/cwp-ui/product-download-info/Z7550-63180/-/sw_free