S4E Mobile Logo

CVE-2025-37164 Scanner

CVE-2025-37164 Scanner - Remote Code Execution (RCE) vulnerability in HPE OneView

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

17 days 6 hours

Scan only one

Domain, Subdomain, IPv4

Toolbox

HPE OneView is a powerful infrastructure management software designed to simplify optimization, monitoring, and control of distributed environments. Used widely by enterprises, it provides a single platform for managing servers, storage, and networking. By automating complex operations and processes, it helps IT departments in medium to large organizations efficiently manage their hardware resources. With its integrated dashboard, users can gain insights into performance and spot potential issues in real-time. HPE OneView is particularly beneficial in data centers due to its ability to provide a unified approach to infrastructure management. It is favored by IT professionals who require robust tools for managing hybrid IT environments.

Remote Code Execution (RCE) is a critical vulnerability that allows an attacker to execute arbitrary commands on a remote device. Attackers exploiting this flaw can run unauthorized commands within the application or service's context, potentially leading to full system compromise. Typically, code execution vulnerabilities are serious, as they can lead to data theft, unauthorized access, and service disruptions. This type of vulnerability often takes advantage of an insecure application input, through which attackers inject and execute their code. The RCE vulnerability in HPE OneView allows for dangerous levels of access due to command execution capabilities. As a result, attackers can control affected systems or further infiltrate connected networks.

The specific RCE vulnerability in HPE OneView involves sending a crafted request to a particular endpoint. The exploit involves making a PUT request to the '/rest/id-pools/executeCommand' endpoint with a malicious payload in the command parameter. This payload includes commands that the attacker wishes to run, represented here as nc with a URL fetching exploit details. A successful exploitation results in the execution of unauthorized commands, depending on specifics such as shell commands specified. The vulnerability requires connection via HTTP, with additions like the "X-API-Version" header to indicate system interaction. The template's indicators of successful execution include specific words like ExecutableCommand appearing in the response.

If exploited, this vulnerability can allow attackers to gain unauthorized access and execute arbitrary commands, leading to potential system-wide compromise. This can cause sensitive data to be spilled, unauthorized modifications to occur, or complete control to be established over the affected systems. Organizations may suffer from service outages, downtimes, or data breaches affecting essential operations. Further, exploiting this vulnerability can form the basis for lateral movements inside a network as attackers aim to escalate privileges. Unmitigated RCE vulnerabilities can thus pose severe threats not only to the immediate target but to the entire associated network.

REFERENCES

Get started to protecting your digital assets