• Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE
No Result
View All Result
Sumtrix
No Result
View All Result
Home Cyber

HPE Releases Crucial Patch for StoreOnce Security Vulnerability

Jane Doe by Jane Doe
June 6, 2025
in Cyber
HPE Releases Crucial Patch for StoreOnce Security Vulnerability
Share on FacebookShare on Twitter

Hewlett Packard Enterprise (HPE) has released a critical update to fix a major security vulnerability in its StoreOnce data backup and deduplication solution that could lead to a full compromise of data and lie undetected in an enterprise network for a long period.

The flaw, identified as CVE-2025-37093 and featuring a CVSS score of 9.8 (Critical), was found in the machine Account Check method implementation in the software, which can be abused by unauthenticated attackers to bypass security restrictions.

The vulnerability, discovered and reported to HP’s partner Trend Micro Zero Day Initiative (ZDI) by a pseudonymous researcher, allows remote unauthorized access to StoreOnce systems.

Read

App Store Power and Censorship: How Apple and Google Shape Your Digital Future

Google Sets Sights on Defying Gravity with Antigravity Project

There is no evidence that the vulnerabilities are being actively exploited in the wild, but cybersecurity researchers caution that backup platforms are being increasingly abused by attackers, and the security flaws need to be patched as soon as possible.

In addition to the critical authentication bypass, HPE’s latest StoreOnce version 4.3.11 also fixes seven other security flaws. These are four high-severity remote code execution (RCE) flaws (CVE-2025-37089, CVE-2025-37091, CVE-2025-37092, CVE-2025-37096) an SSRF issue (CVE-2025-37090) and two directory traversal flaws (CVE-2025-37094, CVE-2025-37095) that can result in arbitrary file deletion or information disclosure. These moderate vulnerabilities are reported to be able to be chained with the critical authentication bypass to compromise the whole system.

HPE is recommending that all StoreOnce customers to be updated to version 4.3.11 as soon as possible. There are no known of any workarounds or mitigations to these vulnerabilities other than the mitigations KVM and QEMU have already deployed, so the updated patch is the sole thing known to exist that will protect from data leakage.

Companies unable to implement the updates straight away are recommended to isolate StoreOnce products affected by the flaw in the meantime.

StoreOnce is heavily used in enterprise, government and in environments with complex IT due to its efficient protection and recovery of data. The consequences of such vulnerabilities are severe and could result in data breaches, ransomware attacks, and major operational disruptions should they be exploited. Keeping a stable patch management process and being aware of the critical security advisories is a must for the entire industry.

Previous Post

Badbox 2.0 Malware Hits Over 1 Million Android Devices: FBI Alert

Next Post

How Geopolitical Tensions and AI Are Fueling the Global Cyberwarfare Threat

Jane Doe

Jane Doe

More Articles

Operation WrtHug Hijacks Tens of Thousands ASUS Routers
Latest News

Operation WrtHug Hijacks Tens of Thousands ASUS Routers

Massive Infection: Tens of thousands of end-of-life ASUS WRT routers compromised worldwide, mainly in Taiwan, the US, and Russia. Exploit...

by Sumit Chauhan
November 19, 2025
WhatsApp Worm Delivers Brazilian Banking Trojan
Cyber

WhatsApp Worm Delivers Brazilian Banking Trojan

Worm Spread: Python-scripted WhatsApp worm targets Brazil, hijacking accounts to send a Delphi-based banking trojan, Eternidade Stealer. Infection Path: Starts...

by Sumit Chauhan
November 19, 2025
FBI Sounds Alarm on Akira Ransomware’s 0 Million Haul
Cyber

FBI Sounds Alarm on Akira Ransomware’s $250 Million Haul

Ransom Total: $248.9 million from 321 victims—mostly US firms in tech, finance, healthcare since May 2023. Tactics: Double extortion—encrypts files,...

by Max Mueller
November 16, 2025
US Car Dealers Grind to Halt in CDK Ransomware Chaos
Cyber

US Car Dealers Grind to Halt in CDK Ransomware Chaos

Scale Hit: 15,000+ dealerships across US and Canada offline—sales, financing, service apps down for weeks. Financial Sting: $1.2 billion lost...

by Mayank Singh
November 16, 2025
Next Post
How Geopolitical Tensions and AI Are Fueling the Global Cyberwarfare Threat

How Geopolitical Tensions and AI Are Fueling the Global Cyberwarfare Threat

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Latest News

China Accuses US of Cyberattacks Using Microsoft Email Server Flaws

China Accuses US of Cyberattacks Using Microsoft Email Server Flaws

August 1, 2025
Online Scam Cases Continue to Rise Despite Crackdowns on Foreign Fraud Networks [Myanmar]

Online Scam Cases Continue to Rise Despite Crackdowns on Foreign Fraud Networks [Myanmar]

June 30, 2025
Stay Safe from Ransomware Using Skitnet Malware Techniques

Stay Safe from Ransomware Using Skitnet Malware Techniques

May 20, 2025
MMaDA-Parallel: Advanced Multimodal Model Revolutionizing Content Generation

MMaDA-Parallel: Advanced Multimodal Model Revolutionizing Content Generation

November 19, 2025
Anthropic Blocks AI Misuse for Cyberattacks

Anthropic Blocks AI Misuse for Cyberattacks

August 28, 2025
New VoIP Botnet Targets Routers Using Default Passwords

New VoIP Botnet Targets Routers Using Default Passwords

July 25, 2025
Aflac Incorporated Discloses Cybersecurity Incident

Aflac Incorporated Discloses Cybersecurity Incident

June 20, 2025
Sumtrix.com

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Navigate Site

  • About
  • Contact
  • Privacy Policy
  • Advertise

Follow Us

No Result
View All Result
  • Home
  • News
  • AI
  • Cyber
  • GRC
  • Blogs
  • Live CVE

© 2025 Sumtrix – Your source for the latest in Cybersecurity, AI, and Tech News.

Our website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.