Cyber999 Advisories

30 June 2025     Advisory

MA-1350.062025: MyCERT Advisory - Privilege Escalation Vulnerability in HPE OneView for VMware vCenter


1.0 Introduction
Recently, Hewlett Packard Enterprise released a security bulletin for local privilege escalation vulnerability in HPE OneView for VMware vCenter  ( CVE-2025-37101 ) .

2.0 Impact
This vulnerability allows a read-only user to escalate privileges and execute administrative actions, posing a significant risk in multi-user and virtualized environments.

3.0 Affected Products

  • CVE-2025-37101 (High)  - HPE OneView for VMware vCenter (OV4VC) versions prior to v11.7

4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the following Hewlett Packard Enterprise Security Bulletin  and apply the latest update:

Kindly, please refer to the URL below for latest update : 

Generally, CyberSecurity Malaysia advises the users of these devices to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.

For further enquiries, please contact us through the following channels:

E-mail: cyber999[at]cybersecurity.my 
Phone: 1-300-88-2999 (monitored during business hours) 
Mobile: +60 19 2665850 (24x7 call incident reporting) 
Business Hours: Mon - Fri 09:00 -18:00 MYT 
Web:  https://www.cybersecurity.my

5.0 References

logo
CyberSecurity Malaysia is the national cyber security specialist agency under the purview of the Ministry of Digital (KD)
 
Contact Us

  • CyberSecurity Malaysia,
    Level 7 Tower 1, Menara Cyber Axis, Jalan Impact,
    63000 Cyberjaya, Selangor Darul Ehsan, Malaysia.

  • enquiry@cybersecurity.my

  • +603 - 8800 7999

  • +603 - 8008 7000

TOP
ASK Byte
Chatbot Portal

Hi, I am ASK Byte. Please submit your questions about the portal and I will try to get answers from online knowledge stores.

Hi, Saya Admin Chatbot. Saya sedia chat dengan anda secara terus. Bagaimana saya boleh membantu anda?

Click the button below to interact with the CSM chatbot

Proceed