Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds HP Enterprise OneView Code Injection Vulnerability to KEV Following Active Exploitation

CISA Adds HP Enterprise OneView Code Injection Vulnerability to KEV Following Active Exploitation

Posted on January 8, 2026January 8, 2026 By CWS

A vital code injection flaw in Hewlett Packard Enterprise OneView, tracked as CVE-2025-37164, has been added to CISA’s Identified Exploited Vulnerabilities (KEV) catalog.

The vulnerability has been confirmed to be actively exploited by menace actors, triggering pressing remediation timelines for federal companies and significant infrastructure operators.

CVE-2025-37164 represents a extreme safety flaw in HP Enterprise OneView, a extensively deployed infrastructure administration platform used throughout information facilities globally.

The vulnerability permits distant unauthenticated attackers to execute arbitrary code on affected techniques with out requiring authentication credentials.

HP Enterprise OneView Code Injection Vulnerability

This unauthenticated assault floor dramatically will increase the danger publicity, as menace actors can compromise techniques instantly from the community perimeter.

The vulnerability stems from improper enter validation in OneView’s code processing features, categorised underneath CWE-94 (Code Injection).

The weak point allows attackers to craft malicious payloads that bypass safety controls and achieve unrestricted command execution capabilities on the host system.

CISA has mandated particular remediation steps for all organizations using HP Enterprise OneView:

Main Mitigation: Apply all safety patches and vendor-issued updates instantly. HP has launched patches to deal with this vulnerability; they have to be deployed urgently.

Compliance Requirement: Federal companies should comply with BOD 22-01 steering for cloud providers and apply equal controls to on-premises OneView deployments inside the 21-day remediation window.

Different Motion: Organizations unable to patch by the deadline ought to contemplate discontinuing OneView providers or implementing compensating controls, pending the seller’s remediation availability.

Whereas particular ransomware marketing campaign particulars stay underneath investigation, CISA’s placement on the KEV catalog confirms energetic menace intelligence.

Organizations ought to assume exploitation makes an attempt are occurring and prioritize patching accordingly.

PriorityTimeframeRecommended ActionImmediate24–48 hoursAudit all OneView cases throughout the infrastructureShort-term1 weekDeploy patches to non-production environments for testingCritical21 daysComplete manufacturing patching earlier than the January 28 deadline

Organizations ought to monitor CISA’s official advisory updates and HP safety bulletins for complete remediation steering and detection indicators.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Active, Adds, CISA, Code, Enterprise, Exploitation, Injection, KEV, OneView, Vulnerability

Post navigation

Previous Post: The State of Trusted Open Source
Next Post: Researchers Expose WHILL Wheelchair Safety Risks via Remote Hacking

Related Posts

SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups SharePoint 0-day Vulnerability Exploited in Wild by All Sorts of Hacker Groups Cyber Security News
Gunra Ransomware Group Leaks 40TB of Data from American Hospital Gunra Ransomware Group Leaks 40TB of Data from American Hospital Cyber Security News
Nike Allegedly Hacked by WorldLeaks Ransomware Group Nike Allegedly Hacked by WorldLeaks Ransomware Group Cyber Security News
New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild New Tool Released to Detect Cisco Secure Email Gateway 0-Day Vulnerability Exploited in the Wild Cyber Security News
Top 10 Best Security Orchestration, Automation, And Response (SOAR) Tools in 2025 Top 10 Best Security Orchestration, Automation, And Response (SOAR) Tools in 2025 Cyber Security News
Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Stealthy WordPress Malware Deliver Windows Trojan via PHP Backdoor Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News