Hewlett Packard Enterprise has disclosed a critical security vulnerability in its OneView for VMware vCenter software that could allow attackers with limited access to escalate their privileges and perform unauthorized administrative actions.
The vulnerability, tracked as CVE-2025-37101, affects all versions of HPE OneView for VMware vCenter with Operations Manager and Log Insight prior to version 11.7, presenting a significant security risk to enterprise virtualization environments.
The security vulnerability identified in HPE OneView for VMware vCenter represents a serious breach in the software’s access control mechanisms.
According to HPE’s Product Security Response Team, the vulnerability allows an attacker who possesses only read-only privileges to perform what security researchers term “Vertical Privilege Escalation.”
This means that users with operator-level access can execute administrative functions that should be restricted to higher-privileged accounts.
The vulnerability’s severity is underscored by its Common Vulnerability Scoring System (CVSS) rating of 8.7 out of 10, placing it in the “high” severity category.
The CVSS vector string reveals concerning characteristics: the attack can be executed over a network with low attack complexity, requires only low-level privileges to initiate, and needs user interaction.
Perhaps most troubling is the “changed” scope designation, indicating that the vulnerability can affect resources beyond the immediate vulnerable component.
HPE OneView for VMware vCenter serves as a critical infrastructure management tool that integrates HPE hardware with VMware’s virtualization platform, making this vulnerability particularly significant for enterprises relying on hybrid cloud infrastructures.
The technical analysis of CVE-2025-37101 reveals a vulnerability with substantial impact potential despite requiring some user interaction. Key characteristics of this security vulnerability include:
HPE has released version 11.7 of OneView for VMware vCenter to address this security vulnerability and strongly recommends immediate deployment across affected systems.
The update is available through HPE’s My HPE Software Center, and the company emphasizes that all organizations running earlier versions should prioritize this upgrade to prevent potential security incidents.
Enterprise administrators should implement this patch as part of their regular security maintenance procedures, particularly given the software’s role in managing critical virtualization infrastructure.
HPE advises that third-party security patches should be applied according to each organization’s established patch management policies to ensure comprehensive protection.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…