HPE’s StoreOnce Snafu: Critical Security Flaw Fixed, But Is Your Data Still at Risk?
Hewlett Packard Enterprise has patched a critical flaw in StoreOnce software, addressing an authentication bypass vulnerability. This flaw, CVE-2025-37093, could have allowed attackers to bypass security measures, but HPE’s swift update has thwarted potential chaos. Backup solutions like StoreOnce remain prime targets, so always keep your data defenses up to date.

Hot Take:
HPE’s StoreOnce software got a makeover this week to patch up some serious vulnerabilities. They finally decided that letting attackers waltz right past authentication might not be the best security strategy. So, they rolled up their sleeves, fixed a critical flaw, and gave a little TLC to a few other security bugs. It’s like HPE’s software just came back from a spa with a new lease on life—less vulnerable and more secure! But don’t get too comfy, because the cyber-villains are always lurking.
Key Points:
- HPE patched a critical authentication bypass flaw in StoreOnce software.
- The vulnerability, CVE-2025-37093, had a CVSS score of 9.8, making it a high priority.
- StoreOnce version 4.3.11 addresses this and seven other vulnerabilities.
- Four of these vulnerabilities could lead to remote code execution if exploited.
- While not yet exploited in the wild, backup solutions are frequent targets for cybercriminals.