• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa flags microsoft office and hpe oneview bugs as actively

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

You are here: Home / General Cyber Security News / CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
January 8, 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerabilities are listed below –

  • CVE-2009-0556 (CVSS score: 8.8) – A code injection vulnerability in Microsoft Office PowerPoint that allows remote attackers to execute arbitrary code by means of memory corruption
  • CVE-2025-37164 (CVSS score: 10.0) – A code injection vulnerability in HPW OneView that allows a remote unauthenticated user to perform remote code execution

Details of CVE-2025-37164 emerged last month when HPE said the vulnerability impacts all versions of the software prior to version 11.00. The company also made available hotfixes for OneView versions 5.20 through 10.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The scope and source of the attacks targeting the two flaws is presently unclear, and there appear to be no public reports referencing their exploitation in the wild. However, a report from eSentire on December 23, 2025, revealed the release of a detailed proof-of-concept (PoC) exploit for CVE-2025-37164.

“Public availability of PoC exploit code significantly increases the risk to organizations running affected versions of the application,” eSentire said. “As the vulnerability impacts all versions prior to 11.0, organizations are strongly advised to apply the required updates to mitigate the potential risk of exploitation.”

Pursuant to Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary fixes by January 28, 2026, to secure their networks against active threats.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «black cat behind seo poisoning malware campaign targeting popular software Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
  • Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
  • Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
  • n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions
  • The Future of Cybersecurity Includes Non-Human Employees
  • Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication
  • Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing
  • Ongoing Attacks Exploiting Critical RCE Vulnerability in Legacy D-Link DSL Routers
  • Two Chrome Extensions Caught Stealing ChatGPT and DeepSeek Chats from 900,000 Users

Copyright © TheCyberSecurity.News, All Rights Reserved.