CVE-2025-37095

9.8 CRITICAL

📋 TL;DR

A directory traversal vulnerability in HPE StoreOnce Software allows attackers to access sensitive files outside the intended directory. This affects HPE StoreOnce systems running vulnerable software versions, potentially exposing configuration files, logs, or other sensitive data.

💻 Affected Systems

Products:
  • HPE StoreOnce Software
Versions: Specific versions not detailed in advisory; check HPE advisory for exact affected versions.
Operating Systems: HPE StoreOnce appliance OS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects HPE StoreOnce backup appliances; exact version details should be verified against HPE advisory.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through access to configuration files containing credentials, enabling lateral movement or data exfiltration.

🟠

Likely Case

Unauthorized access to sensitive system files, potentially exposing configuration details, logs, or other restricted information.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls preventing external exploitation.

🌐 Internet-Facing: HIGH - Directory traversal vulnerabilities can be exploited remotely without authentication.
🏢 Internal Only: MEDIUM - Internal attackers could still exploit this, but requires network access to the system.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Directory traversal vulnerabilities typically have low exploitation complexity and may not require authentication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check HPE advisory for specific patched versions

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbst04847en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Review HPE advisory for affected versions. 2. Download appropriate patch from HPE support portal. 3. Apply patch following HPE StoreOnce update procedures. 4. Restart system as required.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to StoreOnce systems to only trusted management networks.

Access Control Lists

all

Implement strict firewall rules limiting which IPs can communicate with StoreOnce management interfaces.

🧯 If You Can't Patch

  • Isolate StoreOnce systems on dedicated management VLANs with strict access controls.
  • Implement network monitoring for unusual file access patterns to StoreOnce systems.

🔍 How to Verify

Check if Vulnerable:

Check StoreOnce software version against HPE advisory; if running affected version, system is vulnerable.

Check Version:

Check via StoreOnce web interface or CLI; exact command depends on StoreOnce version.

Verify Fix Applied:

Verify software version has been updated to patched version specified in HPE advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file access patterns in StoreOnce logs
  • Multiple failed directory traversal attempts

Network Indicators:

  • HTTP requests with directory traversal patterns (../ sequences) to StoreOnce management interface

SIEM Query:

Search for HTTP requests containing '../' patterns to StoreOnce IP addresses on management ports.

🔗 References

📤 Share & Export