Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsRondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave
RondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave
Cybersecurity

RondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave

•January 16, 2026
0
Infosecurity Magazine
Infosecurity Magazine•Jan 16, 2026

Companies Mentioned

Hewlett Packard Enterprise

Hewlett Packard Enterprise

HPE

Check Point Software

Check Point Software

CHKP

Why It Matters

The active, large‑scale exploitation threatens any organization running unpatched OneView appliances, potentially compromising core data‑center infrastructure. Prompt patching and defensive controls are essential to prevent widespread compromise.

Key Takeaways

  • •RondoDox botnet exploited HPE OneView CVE‑2025‑37164.
  • •CVSS score 10; remote code execution via ExecuteCommand API.
  • •Over 40,000 attacks recorded in single January window.
  • •Check Point blocked tens of thousands; CISA added to KEV.
  • •Immediate patching and compensating controls recommended.

Pulse Analysis

HPE OneView is a widely deployed infrastructure‑management suite that centralizes compute, storage and networking operations for data‑center environments. The recently disclosed CVE‑2025‑37164 flaw resides in the ExecuteCommand REST endpoint tied to the id‑pools feature, allowing unauthenticated callers to inject arbitrary commands that run directly on the host operating system. With a CVSS v3.1 rating of 10, the vulnerability grants full remote code execution and can bypass traditional perimeter defenses, making any unpatched appliance a high‑value target for attackers.

The exploitation surge is being driven by the Linux‑based RondoDox botnet, which has evolved from opportunistic probing to fully automated, large‑scale attacks. Check Point Research recorded more than 40,000 intrusion attempts within a four‑hour window on 7 January, and tens of thousands of additional probes have been blocked since the campaign’s emergence. By leveraging compromised edge devices, RondoDox can propagate laterally across corporate networks, amplifying the risk to critical workloads. Inclusion of the flaw in CISA’s Known Exploited Vulnerabilities catalog signals a coordinated government‑industry response to curb its spread.

Enterprises should treat CVE‑2025‑37164 as a top‑priority patching item and verify that all OneView appliances run the latest firmware released by HPE. In parallel, deploying network‑level segmentation, restricting access to the ExecuteCommand API, and enabling strict outbound filtering can limit botnet reach. Continuous threat‑intelligence feeds, such as those from Check Point and CISA, help security teams detect anomalous traffic early and adjust detection rules accordingly. As attackers increasingly weaponize unmanaged infrastructure, a layered defense strategy that combines timely updates with robust monitoring will be essential to protect critical data‑center operations.

RondoDox Botnet Targets HPE OneView Vulnerability in Exploitation Wave

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...