Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

Posted on January 8, 2026January 8, 2026 By CWS

Jan 08, 2026Ravie LakshmananVulnerability / KEV Catalog
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Wednesday added two safety flaws impacting Microsoft Workplace and Hewlett Packard Enterprise (HPE) OneView to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of lively exploitation.
The vulnerabilities are listed under –

CVE-2009-0556 (CVSS rating: 8.8) – A code injection vulnerability in Microsoft Workplace PowerPoint that enables distant attackers to execute arbitrary code by way of reminiscence corruption
CVE-2025-37164 (CVSS rating: 10.0) – A code injection vulnerability in HPW OneView that enables a distant unauthenticated consumer to carry out distant code execution

Particulars of CVE-2025-37164 emerged final month when HPE stated the vulnerability impacts all variations of the software program previous to model 11.00. The corporate additionally made obtainable hotfixes for OneView variations 5.20 via 10.

The scope and supply of the assaults concentrating on the 2 flaws is presently unclear, and there seem like no public studies referencing their exploitation within the wild. Nevertheless, a report from eSentire on December 23, 2025, revealed the discharge of an in depth proof-of-concept (PoC) exploit for CVE-2025-37164.
“Public availability of PoC exploit code considerably will increase the danger to organizations working affected variations of the applying,” eSentire stated. “Because the vulnerability impacts all variations previous to 11.0, organizations are strongly suggested to use the required updates to mitigate the potential danger of exploitation.”
Pursuant to Binding Operational Directive (BOD) 22-01, Federal Civilian Government Department (FCEB) businesses are advisable to use the mandatory fixes by January 28, 2026, to safe their networks towards lively threats.

The Hacker News Tags:Actively, Bugs, CISA, Exploited, Flags, HPE, Microsoft, Office, OneView

Post navigation

Previous Post: Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit
Next Post: OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls

Related Posts

CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing The Hacker News
Critical Security Threats and Global Cyber Developments Critical Security Threats and Global Cyber Developments The Hacker News
Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns The Hacker News
TeamPCP Exploits LiteLLM via CI/CD Flaw TeamPCP Exploits LiteLLM via CI/CD Flaw The Hacker News
Model Security Is the Wrong Frame – The Real Risk Is Workflow Security Model Security Is the Wrong Frame – The Real Risk Is Workflow Security The Hacker News
Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users Rust-based Myth Stealer Malware Spread via Fake Gaming Sites Targets Chrome, Firefox Users The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Mythos Excels in Vulnerability Detection, Faces Varied Challenges
  • OpenAI Faces Lawsuit Over ChatGPT Data Sharing Practices
  • Revolutionizing Data Center Security with DPUs
  • Ghostwriter Intensifies Phishing Attacks on Ukraine
  • AI Enhances Security with Realistic Attack Simulations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark