Skip to content
· 6 min read CRITICAL CVE-2025-37164 @Sdmrf

HPE OneView's CVSS 10.0: An Unauthenticated API Endpoint That Runs Commands

CVE-2025-37164 is a maximum-severity RCE in HPE OneView. An unauthenticated REST API endpoint executes arbitrary commands. 40,000+ exploit attempts on day one.

On this page

There’s a REST API endpoint in HPE OneView that executes commands. It doesn’t require authentication.

That’s the vulnerability. That’s the whole thing.

CVE-2025-37164 has a CVSS score of 10.0 — the maximum — and it’s being actively exploited in the wild. CISA added it to the KEV catalog on January 7, 2026. A Metasploit module was public within three days of disclosure.

What HPE OneView Is

HPE OneView is an infrastructure management platform. It controls servers, firmware deployment, storage provisioning, and lifecycle management across enterprise data centers. Think of it as the control plane for your physical infrastructure.

A compromised OneView instance doesn’t give an attacker one server. It gives them the management layer for potentially every server in the environment — provisioning, firmware updates, configuration, lifecycle operations.

This is the kind of access that makes ransomware operators’ day.

The Vulnerability

The flaw exists in the ID Pools feature of HPE OneView. The REST API endpoint:

/rest/id-pools/executeCommand

This endpoint processes command execution requests. It was reachable without authentication.

An unauthenticated attacker sends a crafted request to this endpoint and achieves arbitrary command execution on the appliance. No credentials. No special headers. No exploit chain. Just a POST request to an endpoint that does exactly what its name suggests.

Affected versions: HPE OneView 5.20 through 10.20

Fixed in: Version 11.0 (full fix) or vendor-supplied hotfixes

CVSS: 10.0 — Network vector, low complexity, no privileges required, no user interaction, high impact across confidentiality/integrity/availability.

Timeline

DateEvent
Pre-December 2025Security researcher Nguyen Quoc Khanh discovers the flaw
December 16, 2025HPE releases hotfixes
December 17, 2025HPE publishes security advisory
December 18, 2025Rapid7 publishes technical analysis
December 19, 2025Metasploit module released
January 7, 2026CISA adds to KEV catalog
January 7, 202640,000+ automated exploit attempts detected in a single morning

Three days from advisory to Metasploit module. Twenty-two days from advisory to mass exploitation. That’s the window defenders had.

Mass Exploitation

Check Point reported an active, large-scale exploitation campaign on January 7, 2026 — the same day CISA added it to KEV.

Between 05:45 and 09:20 UTC, over 40,000 attack attempts were recorded. Three and a half hours. The attacks were automated, botnet-driven, and delivered the RondoDox botnet payload.

The targets:

  • Government organizations (highest concentration)
  • Financial services
  • Industrial manufacturing

This isn’t opportunistic scanning. This is organized, automated exploitation at scale, targeting sectors where infrastructure management platforms are most likely deployed.

How the Hotfix Works

The hotfix is revealing. Rather than patching the underlying code, HPE added an HTTP rule to the appliance’s webserver that blocks access to /rest/id-pools/executeCommand.

That tells you something about the fix urgency. The fastest way to stop exploitation was to block the endpoint at the web server layer rather than refactor the application code. The full fix came in version 11.0.

What To Do

1. Check Your Version

If you run HPE OneView, check your version immediately.

Vulnerable: 5.20 through 10.20

Safe: 11.0+ or any version with the hotfix applied

2. Apply the Hotfix or Upgrade

Option A: Upgrade to 11.0 — Full fix, recommended for all environments.

Option B: Apply the hotfix — Available for versions 5.20 through 10.20. Applies to both OneView virtual appliance and HPE Synergy Composer variants.

Important caveats:

  • The hotfix must be reapplied after upgrading from 6.60.xx to 7.00.00
  • The hotfix must be reapplied after any HPE Synergy Composer reimage
  • Version 5.20 may remain vulnerable — HPE’s language is ambiguous

3. Check for Compromise

Look for:

  • HTTP requests to /rest/id-pools/executeCommand in web server logs
  • Unexpected processes spawned by the OneView appliance
  • New user accounts or configuration changes you didn’t make
  • Outbound connections to unknown infrastructure
  • Signs of RondoDox botnet activity

4. Network Controls

If you can’t patch immediately:

  • Block external access to the OneView management interface
  • Restrict internal access to authorized admin networks only
  • Monitor for requests to /rest/id-pools/executeCommand
  • Consider taking the appliance offline until patched

OneView management interfaces should never be internet-facing. If yours is, that’s problem number one.

The Infrastructure Management Problem

This is the same class of issue we keep seeing: management platforms with outsized access that become single points of compromise.

The pattern repeats across vendors:

PlatformVulnerabilityImpact
VMware vCenterCVE-2024-37079Data center management
Ivanti EPMMCVE-2026-1281Mobile device management
Fortinet FortiManagerCVE-2024-47575Network device management
HPE OneViewCVE-2025-37164Server infrastructure management

Every one of these sits at a management plane that controls dozens or hundreds of downstream systems. Compromising the management layer gives attackers more leverage than compromising any individual managed device.

And every one of these has had critical, actively exploited vulnerabilities in the past two years.

The uncomfortable question: is the management layer itself a net positive for security, or does it just centralize the risk?

The API Endpoint Problem

An endpoint called executeCommand that accepts unauthenticated requests is not a subtle bug. This isn’t a race condition or a memory corruption issue that requires months of research. It’s an open door with a sign on it.

The security industry has been talking about API security for years. OWASP has an API Security Top 10. Companies sell dedicated API security products. And yet we still find /executeCommand endpoints with no authentication in enterprise infrastructure management platforms.

The Metasploit module was ready in three days because the exploit is trivial. The barrier to exploitation is essentially zero.

References


An API endpoint called “executeCommand” that doesn’t check who’s calling it. Sometimes the vulnerability is exactly what it sounds like.

Related Articles