CVE-2025-37149

6.0 MEDIUM

📋 TL;DR

An out-of-bounds read vulnerability in HPE ProLiant RL300 Gen11 Server UEFI firmware could allow attackers to read sensitive memory contents. This affects organizations using these specific HPE servers with vulnerable firmware versions. The vulnerability requires local access to exploit.

💻 Affected Systems

Products:
  • HPE ProLiant RL300 Gen11 Server
Versions: Specific firmware versions as detailed in HPE advisory
Operating Systems: Any OS running on affected hardware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects HPE ProLiant RL300 Gen11 servers with specific vulnerable UEFI firmware versions. Check HPE advisory for exact version details.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could read sensitive data from UEFI memory, potentially exposing credentials, encryption keys, or other protected information that could lead to further system compromise.

🟠

Likely Case

Information disclosure of limited memory contents, potentially revealing system state information but unlikely to lead directly to full system compromise without additional vulnerabilities.

🟢

If Mitigated

Minimal impact with proper access controls preventing unauthorized local access to servers.

🌐 Internet-Facing: LOW - This vulnerability requires local access to the server and cannot be exploited remotely over the network.
🏢 Internal Only: MEDIUM - While it requires local access, internal attackers or compromised accounts with physical or console access could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the server and knowledge of UEFI exploitation techniques. No public exploit code is currently available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to HPE advisory for specific patched firmware version

Vendor Advisory: https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbhf04952en_us&docLocale=en_US

Restart Required: Yes

Instructions:

1. Download the updated UEFI firmware from HPE Support. 2. Follow HPE's firmware update procedures for ProLiant RL300 Gen11 servers. 3. Apply the firmware update. 4. Reboot the server to complete the update.

🔧 Temporary Workarounds

Restrict physical and console access

all

Limit physical access to servers and restrict console/management interface access to authorized personnel only

Implement strict access controls

all

Ensure only authorized administrators have local access to servers and implement multi-factor authentication for management interfaces

🧯 If You Can't Patch

  • Isolate affected servers in secure data centers with strict physical access controls
  • Monitor for unauthorized access attempts and implement enhanced logging of local access events

🔍 How to Verify

Check if Vulnerable:

Check current UEFI firmware version via iLO interface or HPE System Management Homepage and compare against vulnerable versions in HPE advisory

Check Version:

From iLO or system management interface: show /system1/firmware1

Verify Fix Applied:

Verify UEFI firmware version has been updated to patched version specified in HPE advisory

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized local access attempts
  • Unexpected firmware access or modification events
  • System management interface authentication failures

Network Indicators:

  • Unusual outbound traffic from management interfaces
  • Unauthorized access to iLO/management network segments

SIEM Query:

source="ilo_logs" AND (event_type="authentication_failure" OR event_type="firmware_access")

🔗 References

📤 Share & Export