Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC Exploit Released HPE OneView Vulnerability that Enables Remote Code Execution

Posted on December 23, 2025December 23, 2025 By CWS

Safety researchers have launched a Proof-of-Idea (PoC) exploit for a crucial vulnerability in HPE OneView, a well-liked IT infrastructure administration platform.

The flaw, tracked as CVE-2025-37164, carries a most CVSS rating of 10.0, indicating rapid hazard to enterprise environments.

The vulnerability permits distant attackers to execute malicious code on affected techniques with no need a password or any type of authentication.

A legitimate Metasploit module has already been revealed, making it simple for risk actors to weaponize this flaw.

FeatureDetailsCVE IDCVE-2025-37164SeverityCritical (CVSS 10.0)VendorHewlett Packard Enterprise (HPE)Affected ProductHPE OneView (Variations < 11.0)Vulnerability TypeRemote Code Execution (RCE)Exploit StatusPoC & Metasploit Module Obtainable

Technical Breakdown

The problem lies throughout the ID-Swimming pools REST API endpoint of the HPE OneView software program.

Particularly, the vulnerability exists in how the appliance handles the executeCommand parameter. The code explicitly marks the authentication header as “not required.”

This oversight permits an attacker to ship a easy JSON command, comparable to opening a reverse shell, which the server then executes with excessive privileges.

unpatched variations of ‘HPE OneView for HPE Synergy’ are possible all susceptible

Whereas HPE’s advisory states that every one variations earlier than 11.0 are affected.

In response to Rapid7’s evaluation, the appliance accepts person enter by way of a particular API request (PUT /relaxation/id-pools/executeCommand). Nevertheless, it fails to confirm whether or not the person is allowed.

Researchers discovered that the susceptible “id-pools” function is primarily lively in HPE OneView for HPE Synergy and particular variations of HPE OneView for VMs (Department 6.x).

HPE has launched a hotfix that patches the flaw by blocking entry to the susceptible URL path.

Given the discharge of public exploit code and the excessive privileges related to OneView administration consoles, directors are urged to patch instantly.

Confirm your OneView model instantly and apply the vendor-supplied hotfix to forestall unauthorized entry to your bodily and digital infrastructure.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Code, Enables, Execution, Exploit, HPE, OneView, PoC, Released, Remote, Vulnerability

Post navigation

Previous Post: INTERPOL Arrests 574 in Africa; Ukrainian Ransomware Affiliate Pleads Guilty
Next Post: New MacSync Stealer Malware Attacking macOS Users Using Digitally Signed Apps

Related Posts

New Cyber Attack Weaponizes DeskSoft to Deploy Malware Leveraging RDP Access to Execute Commands Cyber Security News
New MCPoison Attack Leverages Cursor IDE MCP Validation to Execute Arbitrary System Commands Cyber Security News
New Report on Commercial Spyware Vendors Detailing Their Targets and Infection Chains Cyber Security News
NHS Investigating Oracle EBS Hack Following Cl0p Ransomware Group Claim Cyber Security News
ClayRat Android Malware Steals SMS Messages, Call Logs and Capture Victim Photos Cyber Security News
How to Detect and Mitigate Insider Threats in Your Organization Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Teams to Enforce Messaging Safety Defaults Starting January 2026
  • Two Chrome Extensions Caught Secretly Stealing Credentials from Over 170 Sites
  • ServiceNow to Acquire Armis for $7.75 Billion in Cash
  • HardBit 4.0 Ransomware Actors Attack Open RDP and SMB Services to Persist Access
  • Indian Income Tax-Themed Attacking Businesses with a Multi-Stage Infection Chain

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark