Tuesday, March 17, 2026

Attackers Exploit HPE StoreOnce Flaws to Execute Malicious Code Remotely

Hewlett Packard Enterprise (HPE) has issued a critical security bulletin revealing multiple severe vulnerabilities in its StoreOnce Software, which could allow attackers to remotely execute malicious code, bypass authentication, disclose sensitive information, and perform unauthorized file operations.

These flaws affect HPE StoreOnce Virtual Storage Appliance (VSA) versions prior to 4.3.11, potentially exposing enterprise data backup and deduplication environments to significant risk.

Technical Overview

The security advisory details eight distinct vulnerabilities that collectively present a dangerous attack surface for remote exploitation.

Notably, several of these are Remote Code Execution (RCE) vulnerabilities with high severity CVSS scores of 7.2, and an alarming Authentication Bypass vulnerability carrying an exceptionally high CVSS score of 9.8.

Key Vulnerabilities and CVSS Scores

CVE IdentifierVulnerability TypeAttack VectorPrivileges RequiredUser InteractionCVSS v3.1 Base Score
CVE-2025-37089Remote Code ExecutionNetworkHighNone7.2
CVE-2025-37090Server-Side Request ForgeryNetworkNoneNone5.3
CVE-2025-37091Remote Code ExecutionNetworkHighNone7.2
CVE-2025-37092Remote Code ExecutionNetworkHighNone7.2
CVE-2025-37093Authentication BypassNetworkNoneNone9.8
CVE-2025-37094Arbitrary File DeletionNetworkHighNone5.5
CVE-2025-37095Directory Traversal Info DisclosureNetworkHighNone4.9
CVE-2025-37096Remote Code ExecutionNetworkHighNone7.2

Among these, the authentication bypass vulnerability (CVE-2025-37093) is particularly concerning. It allows attackers to completely circumvent authentication controls remotely without any user interaction, granting them full control over the affected systems.

This dramatically increases the risk of large-scale exploits within compromised network environments.

Vulnerability Descriptions

Remote Code Execution (RCE): Attackers can execute arbitrary code remotely with elevated privileges, potentially installing malware, disrupting services, or stealing sensitive data.

Server-Side Request Forgery (SSRF): Enables attackers to craft malicious requests that the affected server executes, potentially leading to further internal network compromise.

Authentication Bypass: This flaw allows attackers to bypass all authentication mechanisms, gaining unauthorized access.

Directory Traversal and Arbitrary File Deletion: Attackers can manipulate file system paths to access restricted files or delete critical data, degrading system integrity.

Information Disclosure: Unauthorized access to sensitive configuration or backup data that could aid in subsequent attacks.

The vulnerabilities affect HPE StoreOnce VSA versions prior to 4.3.11, a widely used solution for backup and data deduplication in enterprise environments.

Given the critical nature of StoreOnce in protecting business continuity, exploitation of these flaws could lead to devastating data loss, ransomware deployment, or unauthorized data exfiltration.

Immediate Actions for Enterprises

  1. Upgrade to StoreOnce Software v4.3.11 or Later:
    HPE has released patches to fully remediate these vulnerabilities. Users should immediately download and deploy the latest version from the HPE Support Center.
  2. Update Patch Management Policies:
    Incorporate these fixes promptly within your organization’s security patch lifecycle to reduce exposure time.
  3. Review Network Access Controls:
    Restrict external access to StoreOnce appliances wherever possible to minimize attack surface.
  4. Monitor for Suspicious Activity:
    Implement enhanced logging and intrusion detection for unusual access or command execution attempts.

Example: Secure Upgrade Check Script Snippet

bash#!/bin/bash
# Simple check for StoreOnce software version on Linux-based systems
current_version=$(storeonce --version)
required_version="4.3.11"

if [[ "$current_version" < "$required_version" ]]; then
  echo "Urgent: Your StoreOnce version ($current_version) is vulnerable. Please upgrade to $required_version or later."
else
  echo "Your StoreOnce version ($current_version) is up to date and secure."
fi

HPE acknowledges anonymous researchers working with Trend Micro’s Zero Day Initiative for responsibly disclosing these vulnerabilities. Customers are encouraged to report any potential security issues to HPE via:

  • Email: security-alert@hpe.com
  • Reporting Form: https://www.hpe.com/info/report-security-vulnerability

Further details on HPE’s security policies and bulletin archives are available on their official site.

The uncovered vulnerabilities in HPE StoreOnce software represent a critical threat to enterprise data integrity and operational security.

Organizations leveraging these backup appliances must act without delay to apply vendor patches and harden their environments against remote code execution and authentication bypass attacks.

Proactive security management remains essential to protect sensitive information and ensure resilient IT infrastructure.

Recent News

Recent News