Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Multiple HPE StoreOnce Vulnerabilities Let Attackers Execute Malicious Code Remotely

Posted on June 3, 2025June 3, 2025 By CWS

A number of safety vulnerabilities in Hewlett-Packard Enterprise (HPE) StoreOnce software program platform that might permit distant attackers to execute malicious code, bypass authentication mechanisms, and entry delicate enterprise information. 

The vulnerabilities have an effect on HPE StoreOnce VSA variations previous to 4.3.11 and current important dangers to enterprise backup and storage infrastructure worldwide.

Safety Flaws Influence Enterprise Storage Safety

The newly recognized vulnerabilities characterize a complete assault floor that threatens the core safety of enterprise storage environments. 

The CVE-2025-37093 vulnerability represents one of the crucial extreme safety dangers recognized in Hewlett-Packard Enterprise’s StoreOnce backup and restoration platform. 

This authentication bypass flaw permits unauthenticated distant attackers to utterly bypass safety controls and achieve unauthorized entry to enterprise storage techniques. 

With a CVSS v3.1 base rating of 9.8 (Crucial), this vulnerability poses existential dangers to organizations counting on unpatched HPE StoreOnce deployments for information safety.

The vulnerability portfolio consists of a number of distant code execution (RCE) flaws tracked as CVE-2025-37089, CVE-2025-37091, CVE-2025-37092, and CVE-2025-37096, every carrying CVSS scores of seven.2. 

These vulnerabilities exploit weaknesses within the StoreOnce software program structure, enabling authenticated attackers with excessive privileges to execute arbitrary code remotely on affected techniques. 

The assault vector AV:N designation signifies that these exploits could be launched throughout community boundaries, considerably increasing the potential assault floor for malicious actors focusing on enterprise storage infrastructure.

The technical composition of those vulnerabilities reveals subtle assault methodologies that focus on a number of layers of the StoreOnce software program stack. 

The listing traversal vulnerabilities CVE-2025-37094 and CVE-2025-37095 exploit path manipulation weaknesses, with the previous enabling arbitrary file deletion capabilities (CVSS 5.5) and the latter facilitating info disclosure assaults (CVSS 4.9). 

These vulnerabilities leverage the CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U vector notation, indicating network-accessible assaults with low complexity necessities.

The distant code execution vulnerabilities share widespread traits of their CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H vector strings, signifying excessive impression potential throughout confidentiality, integrity, and availability domains. 

The PR:H designation signifies that whereas excessive privileges are required for exploitation, profitable assaults can lead to full system compromise. 

The AC:L (Assault Complexity: Low) score means that these vulnerabilities could be exploited with available instruments and methods, making them enticing targets for each subtle risk actors and opportunistic attackers.

Nameless safety researchers working in collaboration with Development Micro’s Zero Day Initiative (ZDI) found these vulnerabilities by coordinated analysis efforts. 

Mitigations

Organizations using HPE StoreOnce VSA deployments should prioritize rapid remediation by software program updates to model 4.3.11 or later. 

HPE has confirmed that each one recognized vulnerabilities have been addressed on this launch, which is offered by the official Hewlett Packard Enterprise Assist Heart obtain portal. 

The remediation timeline is crucial, significantly given the presence of the 9.8 CVSS-rated authentication bypass vulnerability that requires no consumer interplay for exploitation.

System directors ought to implement complete vulnerability scanning procedures to establish affected StoreOnce installations inside their infrastructure. 

Following established patch administration insurance policies when deploying third-party safety updates alongside the StoreOnce software program improve. 

Organizations also needs to evaluation community segmentation methods to restrict potential assault vectors whereas implementing the mandatory software program updates.

Discover this Information Fascinating! Observe us on Google Information, LinkedIn, & X to Get Immediate Updates!

Cyber Security News Tags:Attackers, Code, Execute, HPE, Malicious, Multiple, Remotely, StoreOnce, Vulnerabilities

Post navigation

Previous Post: Microsoft and CrowdStrike Launch Shared Threat Actor Glossary to Cut Attribution Confusion
Next Post: Google Chrome to Distrust Two Certificate Authorities Over Compliance and Conduct Issues

Related Posts

APT36 Attacking BOSS Linux Systems With Weaponized ZIP Files to Steal Sensitive Data Cyber Security News
Critical 0-Click Vulnerability Enables Attackers to Takeover Email Access Using Punycode Cyber Security News
New HTTP Smuggling Attack Technique Let Hackers Inject Malicious Requests Cyber Security News
Livewire Vulnerability Exposes Millions of Laravel Apps to Remote Code Execution Attacks Cyber Security News
Securden Unified PAM Vulnerability Let Attackers Bypass Authentication Cyber Security News
Albemarle County Hit By Ransomware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Use End-to-End Encrypted Email
  • Palo Alto Networks, Zscaler, Jaguar Land Rover, and Cyber Attacks
  • How to Use Email Aliases for Privacy
  • 10 Best Cloud Penetration Testing Companies in 2025
  • 10 Best AI penetration Testing Companies in 2025

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News