A vital code injection flaw in Hewlett Packard Enterprise OneView, tracked as CVE-2025-37164, has been added to CISA’s Identified Exploited Vulnerabilities (KEV) catalog.
The vulnerability has been confirmed to be actively exploited by menace actors, triggering pressing remediation timelines for federal companies and significant infrastructure operators.
CVE-2025-37164 represents a extreme safety flaw in HP Enterprise OneView, a extensively deployed infrastructure administration platform used throughout information facilities globally.
The vulnerability permits distant unauthenticated attackers to execute arbitrary code on affected techniques with out requiring authentication credentials.
HP Enterprise OneView Code Injection Vulnerability
This unauthenticated assault floor dramatically will increase the danger publicity, as menace actors can compromise techniques instantly from the community perimeter.
The vulnerability stems from improper enter validation in OneView’s code processing features, categorised underneath CWE-94 (Code Injection).
The weak point allows attackers to craft malicious payloads that bypass safety controls and achieve unrestricted command execution capabilities on the host system.
CISA has mandated particular remediation steps for all organizations using HP Enterprise OneView:
Main Mitigation: Apply all safety patches and vendor-issued updates instantly. HP has launched patches to deal with this vulnerability; they have to be deployed urgently.
Compliance Requirement: Federal companies should comply with BOD 22-01 steering for cloud providers and apply equal controls to on-premises OneView deployments inside the 21-day remediation window.
Different Motion: Organizations unable to patch by the deadline ought to contemplate discontinuing OneView providers or implementing compensating controls, pending the seller’s remediation availability.
Whereas particular ransomware marketing campaign particulars stay underneath investigation, CISA’s placement on the KEV catalog confirms energetic menace intelligence.
Organizations ought to assume exploitation makes an attempt are occurring and prioritize patching accordingly.
PriorityTimeframeRecommended ActionImmediate24–48 hoursAudit all OneView cases throughout the infrastructureShort-term1 weekDeploy patches to non-production environments for testingCritical21 daysComplete manufacturing patching earlier than the January 28 deadline
Organizations ought to monitor CISA’s official advisory updates and HP safety bulletins for complete remediation steering and detection indicators.
Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.
