PT-2025-51738 · Hewlett Packard · Hpe Oneview
Published
2025-12-16
·
Updated
2026-01-13
·
CVE-2025-37164
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
HPE OneView versions prior to 11.00
HPE OneView versions 5.20 through 10.20
Description
HPE OneView contains a remote code execution issue that allows unauthenticated attackers to execute arbitrary code on affected systems. The vulnerability, tracked as CVE-2025-37164, has a CVSS score of 10.0 and is actively being exploited. The vulnerability stems from improper input handling in a REST API endpoint,
/rest/id-pools/executeCommand, which is accessible without authentication. Successful exploitation could allow attackers to gain complete control over IT infrastructure. Approximately 55,000 organizations worldwide, including 90% of Fortune 500 companies, utilize HPE OneView, making it a significant target. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog and urges immediate patching. A Metasploit exploit module is also available.Recommendations
HPE OneView versions prior to 11.00: Upgrade to version 11.00 or later immediately.
HPE OneView versions 5.20 through 10.20: Apply the hotfix provided by HPE, and re-apply it after any updates from version 6.60 or later to version 7.00.00, or after any system reinstallation using HPE Synergy Composer.
Exploit
Fix
RCE
Code Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2025-16117
CVE-2025-37164
Affected Products
Hpe Oneview
References · 114
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/hpe_oneview_rce.rb⭐ 37255 🔗 14697 · Exploit
- https://nvd.nist.gov/vuln/detail/CVE-2025-37164 · Security Note
- https://bdu.fstec.ru/vul/2025-16117 · Security Note
- https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US#vulnerability-summary-1 · Vendor Advisory
- https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US · Security Note, Vendor Advisory
- https://twitter.com/helpnetsecurity/status/2009269456762012047 · Twitter Post
- https://twitter.com/ct_is/status/2001623387106611451 · Twitter Post
- https://twitter.com/Guardian360nl/status/2009656433537581243 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1ppvwm4/hpe_oneview_vulnerability_exposes_users_to · Reddit Post
- https://reddit.com/r/SecOpsDaily/comments/1ppxjmw/cve202537164_critical_unauthenticated_rce · Reddit Post
- https://twitter.com/0dayPublishing/status/2000973101639544936 · Twitter Post
- https://twitter.com/kernyx64/status/2009558492021997812 · Twitter Post
- https://twitter.com/f1tym1/status/2001666087209824628 · Twitter Post
- https://twitter.com/socradar/status/2001969791482106240 · Twitter Post
- https://twitter.com/f1tym1/status/2009244876316000561 · Twitter Post