Hewlett Packard Enterprise (HPE) has addressed a serious security vulnerability in its OneView software that allows unauthenticated remote code execution. This flaw, identified as CVE-2025-37164, has been rated with a CVSS score of 10.0, indicating its critical nature. HPE OneView, used for managing IT infrastructure, could potentially allow attackers to take control of affected systems without needing to authenticate. This vulnerability can impact organizations relying on this software for IT operations, making it crucial for users to apply the necessary updates to safeguard their environments. HPE's prompt action to patch this flaw is vital in preventing potential exploitation by malicious actors.
Articles tagged "Critical"
Found 363 articles
BleepingComputer
French authorities have arrested two crew members of an Italian passenger ferry, including a Latvian national, for allegedly installing malware on the vessel. This malware could have allowed them to gain remote control over the ship, raising serious concerns about maritime security. The incident underscores the vulnerabilities that can exist in critical infrastructure like passenger ferries, where cyberattacks could potentially endanger lives and disrupt operations. Authorities are investigating the extent of the malware's capabilities and the intentions behind its installation. This case serves as a reminder for the maritime industry to enhance cybersecurity measures to protect against similar threats.
BleepingComputer
Hewlett Packard Enterprise (HPE) has released a critical patch for a severe vulnerability in its HPE OneView software that allows attackers to execute arbitrary code remotely. This flaw poses a significant risk as it could enable cybercriminals to take control of affected systems without any user intervention. Organizations using HPE OneView are urged to apply the patch immediately to protect their infrastructure from potential exploitation. The impact of this vulnerability could be extensive, affecting businesses that rely on this software for managing their IT environments. Users should ensure they are running the latest version to mitigate this serious threat.
France's counterespionage agency is currently investigating a cyberattack that may have involved remote control malware found on an international passenger ferry. This incident raises concerns about foreign interference, as authorities suspect that the malware could be part of a larger plot targeting maritime operations. The presence of such malware on a passenger ferry poses significant risks not only to the vessel itself but also to the safety of the passengers and crew onboard. The investigation is ongoing, and officials are working to determine the extent of the threat and the potential perpetrators behind this attack. This situation emphasizes the vulnerabilities that exist in critical transportation infrastructure and the need for enhanced cybersecurity measures in the maritime sector.
SecurityWeek
SonicWall has released patches for a medium-severity vulnerability in its SMA 1000 series, which has been exploited alongside a critical bug to enable remote code execution. This means that attackers could potentially gain control of affected devices, posing serious risks to organizations using this equipment. Users of SonicWall's SMA 1000 should prioritize applying the latest updates to safeguard their systems. The existence of this zero-day exploit indicates that the vulnerability was being actively exploited before it was disclosed, which raises concerns about the security of devices that have not yet been patched. Companies are urged to review their security measures and ensure they are using the most up-to-date software to protect against such threats.
A new vulnerability, tracked as CVE-2025-20393, has been discovered in Cisco's Secure Email Gateway and Secure Email and Web Manager appliances. This zero-day flaw is reportedly being exploited by hackers linked to China, posing a significant risk to organizations using these products. The vulnerability allows attackers to bypass security controls, potentially leading to unauthorized access and data breaches. Companies using these Cisco appliances should prioritize patching and monitoring their systems to mitigate the risks associated with this exploit. The discovery of this flaw is particularly concerning given the ongoing cyber threats targeting critical infrastructure and enterprise environments.
BleepingComputer
At the Zeroday Cloud hacking competition held in London, cybersecurity researchers were awarded a total of $320,000 for identifying 11 serious remote code execution vulnerabilities in cloud infrastructure components. These vulnerabilities could potentially allow attackers to execute malicious code on affected systems, posing significant risks to cloud service providers and their customers. The event showcased the importance of proactive security measures in cloud computing, as vulnerabilities like these can lead to data breaches and service disruptions. By encouraging the discovery of such flaws, the competition aims to strengthen the overall security of cloud environments. Companies relying on cloud infrastructure should stay vigilant and address any reported vulnerabilities promptly to safeguard their systems.
BleepingComputer
French authorities have arrested a 22-year-old man in connection with a cyberattack that targeted the Ministry of the Interior earlier this month. The attack raised concerns about the security of sensitive government information and the potential for disruption to public services. While details about the specific nature of the attack have not been disclosed, the incident is significant as it highlights vulnerabilities within government systems. Cyberattacks on public institutions can erode trust in government operations and compromise citizen data. This arrest is part of ongoing efforts by law enforcement to combat cybercrime and ensure the security of critical infrastructure.
Infosecurity Magazine
A serious vulnerability in the Motors WordPress theme has been discovered, which affects over 20,000 websites. This flaw allows low-privileged users to gain full administrative control of the affected sites. As a result, attackers could exploit this weakness to alter site content, steal sensitive information, or even take the site offline. Website owners using this theme should take immediate action to secure their sites and prevent unauthorized access. The issue underlines the importance of regularly updating themes and plugins to protect against potential security risks.
BleepingComputer
A ransomware group has taken advantage of a serious vulnerability in React2Shell, identified as CVE-2025-55182, to infiltrate corporate networks. Once they gain access, they deploy their file-encrypting malware in under a minute, making the attack extremely swift and damaging. This incident highlights the urgency for organizations to address this vulnerability, as it poses a significant risk to corporate data security. Companies using systems that incorporate React2Shell need to remain vigilant and take immediate action to protect their networks from potential exploitation. The rapid nature of these attacks underlines the necessity for robust security measures and timely updates.
Help Net Security
CVE-2025-59718Researchers at Arctic Wolf have reported that attackers are actively exploiting a vulnerability in Fortinet's FortiGate firewalls, identified as CVE-2025-59718. This flaw allows unauthorized access to the firewalls, enabling attackers to export sensitive system configuration files. These files can reveal critical information about the network, security policies, and even encrypted passwords, which could facilitate further attacks. Organizations using FortiGate firewalls should take immediate action to protect their systems, as the risk of a security breach is significant due to the data that can be accessed through this vulnerability. The situation underscores the importance of timely updates and security measures to safeguard network infrastructure.
The outgoing chief of the Government Accountability Office (GAO) has raised concerns about the Cybersecurity and Infrastructure Security Agency (CISA) potentially easing its efforts in cybersecurity. In a recent statement, he emphasized the need for continued vigilance in the face of increasing cyber threats. He warned that any reduction in focus could leave critical infrastructure vulnerable to attacks. The comments come amid ongoing discussions about the role and funding of CISA, which is tasked with protecting the nation’s cybersecurity. As CISA navigates its priorities, the former GAO chief's remarks serve as a reminder of the persistent risks in the digital landscape and the importance of maintaining robust security measures.
Reports have surfaced regarding a cyberattack on PDVSA, Venezuela's state-owned oil and gas company, which allegedly led to major disruptions in its operations. While PDVSA has attempted to downplay the incident, the extent of the disruption suggests significant implications for the company and potentially for the wider oil market. This incident raises concerns about the security of critical infrastructure in the sector and the potential for similar attacks targeting other companies. As PDVSA navigates the aftermath, both the company and industry observers will be watching closely to assess the impact on production and supply chains.
Amazon has alerted users that Sandworm, a group associated with Russia's military intelligence, has changed its approach to cyberattacks. Instead of exploiting software vulnerabilities, the group is now targeting poorly configured network edge devices to maintain access to their targets. This shift raises concerns for organizations that may not have secured their network configurations adequately. The focus on these devices suggests attackers are adapting their strategies to exploit weaknesses in network management rather than relying on traditional software flaws. This change could lead to increased risks for various industries, especially those with critical infrastructure that may be vulnerable due to lax network settings.
BleepingComputer
Petróleos de Venezuela (PDVSA), the state-owned oil company of Venezuela, experienced a cyberattack over the weekend that significantly disrupted its export operations. The attack affected the company's ability to manage and deliver oil exports, which are crucial for the Venezuelan economy. While specific details about the nature of the attack remain unclear, it raises concerns about the security of critical infrastructure in the oil sector. This incident is particularly alarming given PDVSA's already precarious financial situation and the importance of oil exports for the country's revenue. The attack serves as a reminder of the vulnerabilities faced by major corporations, especially in politically sensitive regions.