Cybersecurity Forecast 2026: What to Expect – New Report

CVE-2025-37164

Critical Unauthenticated HPE OneView Vulnerability Grants Complete Data Center Control: CVE‑2025‑37164

CVSS Gauge
CVSS Needle

Summary

A serious vulnerability in HPE OneView, CVE-2025-37164, allows attackers to execute code remotely without logging in. It can result in complete control over servers, storage, and networking infrastructure and affects versions prior to 11.00Patching it right away is crucial because there are public exploits, and CISA has identified it as being actively exploited.

Urgent Actions Required

Which Systems Are Vulnerable to CVE‑2025‑37164?

Technical Overview

How Does the CVE‑2025‑37164 Exploit Work?

The attack typically follows these steps:

CVE-2025-37164

What Causes CVE‑2025‑37164?

Vulnerability Root Cause:

The issue is due to an HPE OneView API endpoint that lacks authentication. The affected ID Pools functionality accepts and processes requests without verifying user identity. Because the endpoint lacks access checks, attacker input is executed directly, enabling remote code execution without any credentials.

How Can You Mitigate CVE‑2025‑37164?

If immediate patching is delayed or not possible: 

  • Identify all HPE OneView instances running in the environment, as required by CISA guidance.
  • Fix internet-exposed systems first since no login is needed.
  • Apply vendor hotfixes as soon as possible to reduce risk.
  • Continuously assess organizational risk until remediation is completed, as advised by Health-ISAC.

Which Assets and Systems Are at Risk?

Asset Types Affected:

Business-Critical Systems at Risk:

Exposure Level:

Will Patching CVE‑2025‑37164 Cause Downtime?

Patch application impact: HPE’s hotfix blocks the vulnerable API endpoint without modifying core OneView functionality, resulting in minimal service disruption. Upgrading to OneView 11.00 or applying the emergency hotfix is expected to have low operational downtime, but should be scheduled promptly due to active exploitation.

How Can You Detect CVE‑2025‑37164 Exploitation?

Exploitation Signatures:

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

Compliance & Governance Notes

CVSS Breakdown Table

MetricValue Description
Base Score10.0Maximum severity due to unauthenticated RCE and full control of managed infrastructure
Attack VectorNetwork Exploitable remotely over the network on exposed HPE OneView instances
Attack ComplexityLowNo special conditions are required; confirmed active exploitation
Privileges RequiredNoneNo authentication needed
User Interaction NoneExploit does not require user action
Scope Changed Compromise of OneView affects all managed servers, storage, and networking under its control
Confidentiality Impact HighFull access to infrastructure data and management information
Integrity Impact HighArbitrary code execution allows attackers to modify system and hardware configurations
Availability ImpactHighFull control can disrupt or disable managed infrastructure

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.