HPE Releases Security Patch for StoreOnce to Fix Remote Authentication Bypass Vulnerability

Published:

spot_img

HPE Releases Security Patches for Vulnerabilities in StoreOnce

Hewlett Packard Enterprise (HPE) has taken proactive steps to address significant vulnerabilities in its StoreOnce data backup and deduplication solution. The recent updates tackle multiple issues that could potentially lead to serious security breaches, such as authentication bypass and remote code execution.

Understanding the Vulnerabilities

In total, HPE has identified and patched eight vulnerabilities within StoreOnce. According to the advisory released by the company, these issues could potentially allow unauthorized access to systems, enabling remote code execution, server-side request forgery, arbitrary file deletion, and disclosure of sensitive information. The critical vulnerability, tracked as CVE-2025-37093, has a staggering CVSS score of 9.8, indicating its severity.

The CVE-2025-37093 flaw relates to an authentication bypass affecting all software versions prior to 4.3.11. HPE was first informed of this critical vulnerability on October 31, 2024. As a result, they have rolled out fixes to strengthen the system against potential attacks.

The Root Cause

The Zero Day Initiative (ZDI), which credited an anonymous researcher for identifying the flaws, highlighted that the vulnerabilities stem from the improper implementation of the machineAccountCheck method. ZDI noted that the flawed authentication algorithm enables attackers to circumvent the authentication process entirely.

This lapse opens the door for remote attackers to exploit the system, allowing them to bypass authentication completely. Moreover, the nature of the vulnerability makes it particularly dangerous as it can be combined with other weaknesses to execute arbitrary code, leak information, or delete files at the root level.

Additional Vulnerabilities Identified

The list of vulnerabilities patched alongside CVE-2025-37093 includes:

  • CVE-2025-37089 – Remote Code Execution
  • CVE-2025-37090 – Server-Side Request Forgery
  • CVE-2025-37091 – Remote Code Execution
  • CVE-2025-37092 – Remote Code Execution
  • CVE-2025-37094 – Directory Traversal with Arbitrary File Deletion
  • CVE-2025-37095 – Directory Traversal for Information Disclosure
  • CVE-2025-37096 – Remote Code Execution

Each of these vulnerabilities poses significant risks, revealing the need for prompt action to mitigate potential threats.

Broader Security Measures

The urgency of these updates coincides with HPE’s release of patches for other critical vulnerabilities within its product suite. This includes serious flaws in HPE Telco Service Orchestrator (CVE-2025-31651, CVSS score: 9.8) and OneView (CVE-2024-38475 and CVE-2024-38476, both with CVSS scores of 9.8). These patches address previous weaknesses identified in Apache Tomcat and the Apache HTTP Server.

While there are currently no reports indicating that these vulnerabilities have been actively exploited in the wild, users are strongly encouraged to apply the most recent updates. Doing so is vital for maintaining security and protecting sensitive data stored within their systems.

Conclusion

As cyber threats continue to evolve, the importance of timely software updates cannot be overstated. HPE’s recent release of security patches underscores the company’s commitment to safeguarding its users from potential vulnerabilities. By staying informed and applying updates promptly, users enhance their own cybersecurity measures and contribute to a more secure digital landscape.

spot_img

Related articles

Recent articles

RISE Racing Confirms Ransomware Attack by Sarcoma

RISE Racing Under Siege: A Cybersecurity Breach Exposed Overview of the Incident RISE Racing, a prominent digital service provider for harness racing in Australia, has recently...

Abu Dhabi Fund for Development: $59 Billion in Global Support for 107 Countries

Advancements in UAE's Foreign Aid Strategy: A 2024 Overview The year 2024 marked a significant stride in the UAE's commitment to foreign aid, focusing on...

Researchers Uncover Bitter APT’s Evolving Tactics and Expanding Reach

Insights into the Bitter Hacking Group: A Comprehensive Overview Introduction to Bitter The group known as Bitter has come into focus as a notable state-sponsored hacking...

Kettering Health Cyberattack: Hacker Group Takes Responsibility and Exposes Sensitive Data on Dark Web

Kettering Health Recovers from Cyberattack: Full System Security Restored Overview of the Incident Kettering Health announced on Thursday that it has eliminated all cybersecurity threats following...