Hewlett Packard Enterprise (HPE) has disclosed a critical remote code execution (RCE) vulnerability, CVE-2025-37164, affecting its HPE OneView infrastructure management platform. The vulnerability has been assigned the maximum possible CVSS 3.1 score of 10.0, reflecting its severity. It allows a remote, unauthenticated attacker to execute arbitrary code, effectively taking full control of the OneView appliance. This flaw impacts a broad range of versions, from 5.20 to 10.20. As OneView is a privileged tool used to manage core data center components, its compromise would be catastrophic, granting attackers centralized control over servers and storage. HPE strongly advises customers to upgrade to the patched OneView version 11.0 or apply a hotfix without delay.
This vulnerability was discovered and reported by security researcher Nguyen Quoc Khanh. The technical specifics of the flaw have not been publicly detailed, but its perfect CVSS score indicates that it is likely easy to exploit and requires no user interaction. An attacker who can reach the OneView appliance over the network can exploit this flaw to gain complete control.
The impact of exploiting CVE-2025-37164 is extremely severe. HPE OneView is a foundational component of many enterprise data centers, providing a single pane of glass for managing HPE servers, storage arrays, and firmware updates. A compromise of this system is equivalent to an attacker gaining the master keys to the data center.
Potential consequences include:
As noted by security analysts at Rapid7, compromising OneView doesn't just grant access to one machine; it "hands over the keys to the building."
As of December 19, 2025, there are no public reports of active in-the-wild exploitation. However, given the 10.0 CVSS score and the public disclosure, it is highly probable that threat actors will develop a functional exploit in the near future. The SANS Institute has highlighted the urgency of patching before attackers can weaponize the flaw, especially ahead of the holiday period when security staffing is often reduced.
Since there is no known exploit, detection focuses on identifying vulnerable systems and monitoring for anomalous activity.
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
port |
443 |
Default HTTPS port for the HPE OneView management interface. | Network scans, asset inventory. | high |
url_pattern |
/rest/login-sessions |
A common API endpoint for OneView. Monitor for unusual request patterns or repeated failed access attempts. | WAF logs, reverse proxy logs. | medium |
log_source |
HPE OneView Audit Log |
Review for any unauthorized configuration changes, user creations, or API access from unknown IP addresses. | SIEM, log management platform. | high |
network_traffic_pattern |
* |
Any network connections originating from the OneView appliance to external or non-standard internal destinations. | Firewall logs, Netflow data. | high |
The primary mitigation is to upgrade to HPE OneView 11.0 or apply the provided hotfix immediately.
Mapped D3FEND Techniques:
Isolate the OneView appliance on a secure management network and use strict firewall rules to prevent unauthorized access.
Mapped D3FEND Techniques:
The most urgent and effective action is to patch CVE-2025-37164 by upgrading all HPE OneView instances to version 11.0 or applying the emergency hotfix provided by HPE. Given the 10.0 CVSS score, this should be treated as a top-priority, emergency change. Use asset inventory and vulnerability management tools to ensure all affected versions (5.20 through 10.20) are identified and remediated. Verify successful patching by re-scanning the assets. This directly removes the vulnerability and is the only way to fully protect against exploitation.
As a critical compensating control, enforce strict network isolation for all HPE OneView appliances. These management platforms should never be accessible from the internet. Place them on a dedicated, hardened management VLAN with strict firewall rules that deny all traffic by default. Only permit access from a limited set of authorized administrator workstations or a secure jump host. This 'deny-by-default' stance dramatically reduces the attack surface and would prevent a remote, unauthenticated attacker from ever reaching the vulnerable interface, regardless of its patch status.
Forward all audit logs from HPE OneView to a centralized SIEM for continuous monitoring. Create high-priority alerts for any unauthorized or anomalous administrative activity, such as user account creation, privilege escalation, or configuration changes occurring outside of change windows. Should an attacker exploit CVE-2025-37164 before it is patched, monitoring these logs provides the best opportunity to detect their post-exploitation actions, such as creating a backdoor account or modifying server profiles. This serves as a crucial detection layer for a compromised management plane.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats