Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

Posted on January 8, 2026January 8, 2026 By CWS

Jan 08, 2026Ravie LakshmananVulnerability / KEV Catalog
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Wednesday added two safety flaws impacting Microsoft Workplace and Hewlett Packard Enterprise (HPE) OneView to its Identified Exploited Vulnerabilities (KEV) catalog, citing proof of lively exploitation.
The vulnerabilities are listed under –

CVE-2009-0556 (CVSS rating: 8.8) – A code injection vulnerability in Microsoft Workplace PowerPoint that enables distant attackers to execute arbitrary code by way of reminiscence corruption
CVE-2025-37164 (CVSS rating: 10.0) – A code injection vulnerability in HPW OneView that enables a distant unauthenticated consumer to carry out distant code execution

Particulars of CVE-2025-37164 emerged final month when HPE stated the vulnerability impacts all variations of the software program previous to model 11.00. The corporate additionally made obtainable hotfixes for OneView variations 5.20 via 10.

The scope and supply of the assaults concentrating on the 2 flaws is presently unclear, and there seem like no public studies referencing their exploitation within the wild. Nevertheless, a report from eSentire on December 23, 2025, revealed the discharge of an in depth proof-of-concept (PoC) exploit for CVE-2025-37164.
“Public availability of PoC exploit code considerably will increase the danger to organizations working affected variations of the applying,” eSentire stated. “Because the vulnerability impacts all variations previous to 11.0, organizations are strongly suggested to use the required updates to mitigate the potential danger of exploitation.”
Pursuant to Binding Operational Directive (BOD) 22-01, Federal Civilian Government Department (FCEB) businesses are advisable to use the mandatory fixes by January 28, 2026, to safe their networks towards lively threats.

The Hacker News Tags:Actively, Bugs, CISA, Exploited, Flags, HPE, Microsoft, Office, OneView

Post navigation

Previous Post: Hackers Exploiting VMware ESXi Instances in the Wild Using zero-day Exploit Toolkit
Next Post: OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls

Related Posts

A Technical Gap Analysis of Last-Mile Protection A Technical Gap Analysis of Last-Mile Protection The Hacker News
EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates EdgeStepper Implant Reroutes DNS Queries to Deploy Malware via Hijacked Software Updates The Hacker News
Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure Scattered Spider Hacker Arrests Halt Attacks, But Copycat Threats Sustain Security Pressure The Hacker News
CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities CISA Updates KEV Catalog with Four Actively Exploited Software Vulnerabilities The Hacker News
Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages Cybercriminals Deploy CORNFLAKE.V3 Backdoor via ClickFix Tactic and Fake CAPTCHA Pages The Hacker News
GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection GootLoader Malware Uses 500–1,000 Concatenated ZIP Archives to Evade Detection The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark