Home icon Chevron Categories Chevron Blog Chevron News Chevron

HPE Issues Critical Security Fixes for StoreOnce Backup Systems

HPE Issues Critical Security Fixes for StoreOnce Backup Systems

June 04, 2025


Hewlett Packard Enterprise (HPE) has rolled out urgent security patches to fix eight separate vulnerabilities in its StoreOnce data backup and deduplication platform. These flaws, if left unaddressed, could enable attackers to bypass authentication measures and execute remote code on affected systems.

According to HPE’s official advisory, the vulnerabilities open the door to various attack vectors, including remote code execution (RCE), information leakage, server-side request forgery (SSRF), unauthorized access, file deletion, and directory traversal attacks.

One of the most serious issues, tracked as CVE-2025-37093, holds a critical severity rating of 9.8 on the CVSS scale. This flaw, found in all versions prior to 4.3.11, allows attackers to bypass authentication entirely. Reported on October 31, 2024, the bug was discovered by an anonymous researcher and shared via the Zero Day Initiative (ZDI).

ZDI explained the root of the vulnerability lies in a faulty implementation of the machineAccountCheck method, which fails to correctly validate authentication. If exploited, it can be used by remote attackers to gain unauthorized access and potentially chain with other vulnerabilities to perform further malicious actions like executing code, stealing data, or deleting files — all with root-level privileges.

The list of addressed vulnerabilities includes:

  • CVE-2025-37089 – Remote Code Execution

  • CVE-2025-37090 – Server-Side Request Forgery

  • CVE-2025-37091 – Remote Code Execution

  • CVE-2025-37092 – Remote Code Execution

  • CVE-2025-37093 – Authentication Bypass

  • CVE-2025-37094 – Arbitrary File Deletion via Directory Traversal

  • CVE-2025-37095 – Information Disclosure via Directory Traversal

  • CVE-2025-37096 – Remote Code Execution

In addition, HPE also released updates for other critical vulnerabilities in its Telco Service Orchestrator (CVE-2025-31651) and OneView management software (CVE-2024-38475 and CVE-2024-38476), both scoring 9.8, stemming from previously known issues in Apache Tomcat and Apache HTTP Server components.

At present, no signs of active exploitation have been reported. However, HPE strongly advises all users to apply the latest security updates as soon as possible to minimise risk.

Stay alert, and keep your security measures updated!

Source: Follow cybersecurity88 on X and LinkedIn for the latest cybersecurity news


Did you like the post? Share it in your media

Latest Articles

Featured

Researchers Confirm Active Exploitation of Critical BeyondTrust CVSS 9.9 Vulnerability

February 13, 2026 · Chetna Sehgal

Researchers have confirmed that attackers are actively exploiting a critical security flaw in Bey...

Read More >
Featured

Russia Moves to Block WhatsApp and Restrict Telegram in Expanding Digital Crackdown

February 13, 2026 · Chetna Sehgal

Russia has taken strong action to restrict two of its most widely used messaging apps WhatsApp an...

Read More >
Featured

Apple Patches Actively Exploited Zero-Day in iOS, macOS and Core System Component Dynamic Link Editor

February 12, 2026 · Chetna Sehgal

Apple has released urgent security updates after confirming that a zero-day vulnerability was act...

Read More >
Featured

AI-Powered Deepfakes Used by North Korea’s UNC1069 to Infiltrate Crypto Companies

February 12, 2026 · Chetna Sehgal

North Korea’s cyber operations are back in focus after new research exposed a group called UNC1...

Read More >
Featured

How Samsung Knox Strengthens Mobile Security and Helps Organizations Prevent Network Breaches

February 06, 2026 · Chetna Sehgal

Network security breaches are becoming a serious concern for businesses across the world. Attacke...

Read More >
Featured

Uncovering a Long-Running Global Cyber-Espionage Campaign

February 06, 2026 · Chetna Sehgal

A previously undocumented, Asia-linked cyber-espionage group has breached at least 70 government ...

Read More >
Newsletter line