Original Article Text

Click to Toggle View

Hewlett Packard Enterprise warns of critical StoreOnce auth bypass. Hewlett Packard Enterprise (HPE) has issued a security bulletin to warn about eight vulnerabilities impacting StoreOnce, its disk-based backup and deduplication solution. Among the flaws fixed this time is a critical severity (CVSS v3.1 score: 9.8) authentication bypass vulnerability tracked under CVE-2025-37093, three remote code execution bugs, two directory traversal problems, and a server-side request forgery issue. The flaws impact all versions of the HPE StoreOnce Software before v4.3.11, which is now the recommended upgrade version. Here's the complete list of the eight vulnerabilities HPE fixed in version 4.3.11: Not many details were disclosed about the flaws this time. However, Zero Day Initiative (ZDI), which discovered them, mentions that CVE-2025-37093 exists within the implementation of the machineAccountCheck method, resulting from improper implementation of an authentication algorithm. Although CVE-2025-37093 is the only vulnerability rated as critical, others still carry significant risks even if they are typically categorized lower in the severity rating. The ZDI explains that the authentication bypass problem is the key to unlocking the potential in all other flaws, so their risk isn't isolated. The examples of CVE-2025-3794 and CVE-2025-37095, two medium-severity file deletion and information disclosure flaws, show that exploitation is practically easier than what's reflected in the score. "This vulnerability allows remote attackers to disclose sensitive information on affected installations of Hewlett Packard Enterprise StoreOnce VSA," explains ZDI. "Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed." Notably, the flaws were discovered and reported to HPE in October 2024, with seven full months having passed until fixes finally became available to customers. Still, there are no reports of active exploitation. HPE StoreOnce is typically used for backup and recovery in large enterprises, data centers, cloud service providers, and generally, organizations handling big data or large virtualized environments. StoreOnce integrates with backup software like HPE Data Protector, Veeam, Commvault, and Veritas NetBackup, ensuring business continuity and effective backup management. That being said, administrators of potentially impacted environments must take immediate action and apply the available security updates to close the gaps. HPE has listed no mitigations or workarounds for the eight flaws in the bulletin, so upgrading is the recommended solution. Why IT teams are ditching manual patch management Manual patching is outdated. It's slow, error-prone, and tough to scale. Join Kandji + Tines on June 4 to see why old methods fall short. See real-world examples of how modern teams use automation to patch faster, cut risk, stay compliant, and skip the complex scripts.

Daily Brief Summary

CYBERCRIME // HPE Issues Urgent Fixes for Critical StoreOnce Security Flaws

Hewlett Packard Enterprise (HPE) has released patches for eight vulnerabilities in StoreOnce, a disk-based data backup system.

The critical flaw, CVE-2025-37093, enables an authentication bypass with a high severity score of 9.8, potentially impacting all functional aspects of the system.

Other vulnerabilities include three remote code execution issues, two directory traversal problems, and a server-side request forgery threat.

All mentioned vulnerabilities affect versions of HPE StoreOnce Software prior to version 4.3.11, with an update now urged by HPE.

Although discovered by the Zero Day Initiative in October 2024, the disclosed vulnerabilities took seven months before patches were made available.

There are no known cases of these vulnerabilities being exploited in the wild as of the report.

HPE highlights that without the essential upgrades, the security of large enterprises, data centers, and cloud service providers using StoreOnce could be at significant risk.