CVE-2025-37094

5.5 MEDIUM

📋 TL;DR

This vulnerability allows attackers to delete arbitrary files on HPE StoreOnce backup appliances through directory traversal techniques. It affects HPE StoreOnce Software installations, potentially compromising data integrity and availability. Attackers could exploit this to delete critical system or backup files.

💻 Affected Systems

Products:
  • HPE StoreOnce Software
Versions: Specific versions not detailed in advisory; refer to HPE security bulletin for exact affected versions
Operating Systems: HPE StoreOnce appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects HPE StoreOnce backup appliances running vulnerable software versions. Requires access to the StoreOnce management interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through deletion of critical operating system files, rendering the appliance inoperable and causing permanent data loss.

🟠

Likely Case

Selective deletion of backup data or configuration files, disrupting backup operations and potentially causing data recovery challenges.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting non-critical files.

🌐 Internet-Facing: MEDIUM - While directory traversal vulnerabilities can be serious, this requires specific access to the StoreOnce interface and appropriate authentication level.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts could exploit this to delete critical backup data, potentially affecting disaster recovery capabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Directory traversal vulnerabilities are typically straightforward to exploit once the attack vector is identified. Requires authenticated access to the vulnerable interface.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to HPE security bulletin HPEBSN04847 for specific patched versions

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Review HPE security bulletin HPEBSN04847. 2. Download appropriate firmware update from HPE Support Portal. 3. Apply firmware update following HPE StoreOnce update procedures. 4. Restart appliance as required by update process.

🔧 Temporary Workarounds

Restrict Network Access

all

Limit access to StoreOnce management interface to trusted administrative networks only

Configure firewall rules to restrict access to StoreOnce management IP/ports

Implement Least Privilege

all

Restrict administrative access to only necessary personnel and monitor privileged account usage

Review and tighten user access controls in StoreOnce management interface

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate StoreOnce appliances from untrusted networks
  • Enable comprehensive logging and monitoring of file deletion activities on StoreOnce systems

🔍 How to Verify

Check if Vulnerable:

Check current firmware version against HPE security bulletin HPEBSN04847 for affected versions

Check Version:

Check firmware version via StoreOnce management interface or CLI (specific command varies by version)

Verify Fix Applied:

Verify firmware version has been updated to patched version specified in HPE advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual file deletion patterns
  • Multiple failed file access attempts with traversal patterns
  • Administrative actions from unexpected sources

Network Indicators:

  • HTTP requests containing directory traversal sequences to StoreOnce management interface

SIEM Query:

source="storeonce" AND (event_type="file_delete" OR http_uri CONTAINS "../")

🔗 References

📤 Share & Export