Critical HPE StoreOnce Flaws Allow Remote Code Execution by Attackers

Critical HPE StoreOnce Flaws Allow Remote Code Execution by Attackers

Hewlett-Packard Enterprise (HPE) has issued a critical security bulletin (HPESBST04847 rev. 1) warning users of multiple high-impact vulnerabilities in its StoreOnce Software, specifically affecting versions before 4.3.11.

The vulnerabilities, if exploited, could allow attackers to bypass authentication, execute arbitrary code remotely, perform server-side request forgery (SSRF), delete files, and access sensitive information via directory traversal.

One of the most severe vulnerabilities, tracked as CVE-2025-37093, enables remote attackers to bypass authentication entirely, granting unauthorized access to affected StoreOnce VSA systems.

– Advertisement –

This flaw, rooted in the improper implementation of the machineAccountCheck method, allows adversaries to gain system-level privileges without any user interaction or credentials.

With a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it is classified as “critical” and requires immediate attention.

CVEs, Attack Vectors, and Severity

The bulletin identifies eight distinct CVEs, each with specific technical implications.

The following table summarizes the vulnerabilities, their CVSS scores, and potential impacts:

CVE ID Attack Type CVSS v3.1 Vector Base Score Potential Impact
CVE-2025-37089 Remote Code Execution AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 7.2 Full system compromise
CVE-2025-37090 Server-Side Request Forgery AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N 5.3 SSRF, data exposure
CVE-2025-37091 Remote Code Execution AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 7.2 Full system compromise
CVE-2025-37092 Remote Code Execution AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 7.2 Full system compromise
CVE-2025-37093 Authentication Bypass AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 9.8 Unauthorized access, data loss
CVE-2025-37094 Directory Traversal, Deletion AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H 5.5 Arbitrary file deletion
CVE-2025-37095 Directory Traversal, Info Leak AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N 4.9 Information disclosure
CVE-2025-37096 Remote Code Execution AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H 7.2 Full system compromise

The most critical, CVE-2025-37093, requires no authentication or user interaction, making it highly exploitable over the network.

Attackers can potentially access, modify, or delete sensitive data, disrupt system availability, and compromise the integrity of backup and storage operations.

Other vulnerabilities, such as CVE-2025-37094, enable directory traversal attacks that could result in the deletion of critical files, further threatening data integrity and business continuity.

Mitigation and Recommendations: Patch Now

According to the report, HPE strongly recommends that all customers running StoreOnce Software versions before 4.3.11 upgrade immediately to version 4.3.11 or later, which addresses all identified vulnerabilities.

There are currently no known workarounds for these flaws, making prompt patching essential to prevent exploitation.

Security teams should also:

  • Isolate vulnerable StoreOnce systems from untrusted networks until patched.
  • Monitor for unauthorized access attempts and unusual activity.
  • Apply network segmentation to limit potential lateral movement by attackers.
  • Review system management and security procedures regularly to maintain system integrity.

For further assistance, customers are advised to contact HPE support or refer to the official security bulletin (Document ID: hpesbst04847en_us) for detailed remediation steps.

Summary Table: HPE StoreOnce Critical Vulnerabilities

Affected Product Impacted Versions Fixed in Version Key CVEs (Critical) Patch Required?
HPE StoreOnce VSA < 4.3.11 4.3.11 CVE-2025-37093, -37094, -37089 Yes

Immediate action is required to safeguard enterprise data and maintain operational resilience in the face of these newly disclosed threats.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!


Source link

About Cybernoz

Security researcher and threat analyst with expertise in malware analysis and incident response.