HPE Releases Security Patch for StoreOnce Vulnerability Allowing Remote Authentication Bypass

June 04, 2025
Vulnerability / DevOps

Hewlett Packard Enterprise (HPE) has issued security updates to address up to eight vulnerabilities in its StoreOnce data backup and deduplication software, which could lead to remote authentication bypass and remote code execution. HPE’s advisory states, “These vulnerabilities could be remotely exploited, enabling remote code execution, information disclosure, server-side request forgery, authentication bypass, arbitrary file deletion, and directory traversal.” Among them is a critical flaw identified as CVE-2025-37093, rated 9.8 on the CVSS scale, which affects all software versions prior to 4.3.11. The vendor was notified of the vulnerability on October 31, 2024. Acknowledging an anonymous researcher for the discovery, the Zero Day Initiative (ZDI) shared insights on the issue…

HPE Releases Critical Security Patch for StoreOnce, Addressing Authentication Bypass Vulnerabilities

On June 4, 2025, Hewlett Packard Enterprise (HPE) announced the rollout of significant security updates aimed at rectifying multiple vulnerabilities within its StoreOnce data backup and deduplication solution. Among the eight identified flaws, a particularly concerning authentication bypass issue could allow unauthorized remote access and remote code execution, raising potential security risks for organizations relying on this technology.

In an advisory, HPE emphasized that these vulnerabilities might be exploited to enable an array of attacks, including remote code execution, information disclosure, server-side request forgery, arbitrary file deletion, and directory traversal vulnerabilities. Notably, one of the critical flaws, labeled CVE-2025-37093, has received a severe rating of 9.8 on the CVSS scoring system. This vulnerability affects all software versions prior to 4.3.11 and poses serious threats to the integrity of systems utilizing StoreOnce.

The discovery of these issues was credited to an anonymous researcher through the Zero Day Initiative (ZDI), which reported that the concerns were brought to HPE’s attention on October 31, 2024. Given the breadth of the vulnerabilities, business owners should carefully assess their current StoreOnce implementations and take prompt action to apply the necessary patches.

Targeting various organizations, this security breach has implications for businesses across sectors, particularly as data protection remains a top priority amid evolving cyber threats. The U.S.-based businesses that depend on HPE’s StoreOnce solutions should be particularly vigilant, as failure to address these vulnerabilities could lead to severe operational and reputational damage.

In the context of the MITRE ATT&CK framework, these vulnerabilities outline potential tactics that adversaries may employ. Initial access could be gained through exploiting the authentication bypass, which in turn might lead to persistence within the affected systems. Techniques related to privilege escalation can also be inferred, as attackers could escalate their access levels following successful exploitation of the vulnerability.

The nature of these vulnerabilities highlights an ongoing challenge for organizations to maintain robust cybersecurity measures. Cybersecurity teams must ensure that their systems are updated to close any gaps that attackers might exploit. As cyber threats continue to evolve, comprehensive awareness and proactive defense strategies become paramount for safeguarding sensitive data and maintaining business continuity.

As HPE continues to address these vulnerabilities, the incident serves as a crucial reminder to business leaders about the importance of staying informed about security patches and updates. It underscores the necessity to foster a culture of cybersecurity vigilance, ensuring that all systems are regularly monitored and maintained against emerging threats.

Source link