CISA flags actively exploited Office relic alongside fresh HPE flaw
(2026/01/08)
- Reference: 1767879874
- News link: https://www.theregister.co.uk/2026/01/08/cisa_oneview_powerpoint_bugs/
- Source link:
CISA has added a pair of security holes to its actively exploited list, warning that attackers are now abusing a maximum-severity bug in HPE's OneView management software and a years-old flaw in Microsoft Office.
The latest update to [1]CISA's Known Exploited Vulnerabilities catalog flags CVE-2025-37164, a code injection vulnerability in HPE OneView, and CVE-2009-0556, a PowerPoint code injection bug that's been lurking for more than 15 years.
CVE-2025-37164 carries a perfect 10.0 CVSS score and affects HPE OneView, software used to manage servers, storage, and networking gear from a central console. In a December 18 advisory, HPE [2]said the flaw could be exploited to inject and execute code, potentially granting full control of affected environments, [3]though it did not say at the time whether attacks were already underway .
[4]
CISA's decision to add the flaw to its exploited-in-the-wild catalog suggests that has now changed, even if details remain thin. HPE did not respond to The Register's questions about whether attackers have been observed in customer environments, how many customers might be exposed, or if any data has been exfiltrated as a result of exploitation.
[5]An early end to the holidays: 'Heartbleed of MongoDB' is now under active exploit
[6]From AI to analog, cybersecurity tabletop exercises look a little different this year
[7]WatchGuard sounds alarm as critical Firebox flaw comes under active attack
[8]Amazon security boss blames Russia's GRU for years-long energy-sector hacks
Security firms, however, previously warned that the bug was unlikely to remain theoretical for long. Following HPE's disclosure, a proof-of-concept exploit was published by Rapid7, which suggested defenders treat the issue as an assumed-breach scenario. eSentire [9]noted that the availability of working exploit code significantly lowered the barrier for attackers to move from curiosity to compromise.
Alongside the OneView issue, CISA also flagged CVE-2009-0556, a Microsoft Office PowerPoint code injection vulnerability rated 8.8 on the CVSS scale. The bug, [10]confirmed by Microsoft back in 2009 , allows remote attackers to execute arbitrary code via memory corruption when a user opens a specially crafted PowerPoint file. Microsoft patched the issue years ago as part of MS09-017, but its appearance in the KEV catalog indicates that unpatched or unsupported systems are still being successfully targeted.
[11]
The two vulnerabilities have little in common. One is old enough to vote and should have been patched out of existence long ago, while the other is a fresh enterprise flaw buried in the machinery of modern datacenters. For attackers, age clearly isn't a deal-breaker if the exploit still works. ®
Get our [12]Tech Resources
[1] https://www.cisa.gov/news-events/alerts/2026/01/07/cisa-adds-two-known-exploited-vulnerabilities-catalog
[2] https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US#vulnerability-summary-1
[3] https://www.theregister.com/2025/12/19/hpe_oneview_rce_bug/
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aV_iu07lnxrSRDd2pRm5iAAAAA4&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[5] https://www.theregister.com/2025/12/30/mongodb_vuln_exploited_cve_2025_14847/
[6] https://www.theregister.com/2025/12/26/end_of_year_tabletop_exercises/
[7] https://www.theregister.com/2025/12/19/watchguard_firebox/
[8] https://www.theregister.com/2025/12/15/amazon_ongoing_gru_campaign/
[9] https://www.esentire.com/security-advisories/poc-released-for-hpe-oneview-vulnerability-cve-2025-37164
[10] https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aV_iu07lnxrSRDd2pRm5iAAAAA4&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[12] https://whitepapers.theregister.com/
The latest update to [1]CISA's Known Exploited Vulnerabilities catalog flags CVE-2025-37164, a code injection vulnerability in HPE OneView, and CVE-2009-0556, a PowerPoint code injection bug that's been lurking for more than 15 years.
CVE-2025-37164 carries a perfect 10.0 CVSS score and affects HPE OneView, software used to manage servers, storage, and networking gear from a central console. In a December 18 advisory, HPE [2]said the flaw could be exploited to inject and execute code, potentially granting full control of affected environments, [3]though it did not say at the time whether attacks were already underway .
[4]
CISA's decision to add the flaw to its exploited-in-the-wild catalog suggests that has now changed, even if details remain thin. HPE did not respond to The Register's questions about whether attackers have been observed in customer environments, how many customers might be exposed, or if any data has been exfiltrated as a result of exploitation.
[5]An early end to the holidays: 'Heartbleed of MongoDB' is now under active exploit
[6]From AI to analog, cybersecurity tabletop exercises look a little different this year
[7]WatchGuard sounds alarm as critical Firebox flaw comes under active attack
[8]Amazon security boss blames Russia's GRU for years-long energy-sector hacks
Security firms, however, previously warned that the bug was unlikely to remain theoretical for long. Following HPE's disclosure, a proof-of-concept exploit was published by Rapid7, which suggested defenders treat the issue as an assumed-breach scenario. eSentire [9]noted that the availability of working exploit code significantly lowered the barrier for attackers to move from curiosity to compromise.
Alongside the OneView issue, CISA also flagged CVE-2009-0556, a Microsoft Office PowerPoint code injection vulnerability rated 8.8 on the CVSS scale. The bug, [10]confirmed by Microsoft back in 2009 , allows remote attackers to execute arbitrary code via memory corruption when a user opens a specially crafted PowerPoint file. Microsoft patched the issue years ago as part of MS09-017, but its appearance in the KEV catalog indicates that unpatched or unsupported systems are still being successfully targeted.
[11]
The two vulnerabilities have little in common. One is old enough to vote and should have been patched out of existence long ago, while the other is a fresh enterprise flaw buried in the machinery of modern datacenters. For attackers, age clearly isn't a deal-breaker if the exploit still works. ®
Get our [12]Tech Resources
[1] https://www.cisa.gov/news-events/alerts/2026/01/07/cisa-adds-two-known-exploited-vulnerabilities-catalog
[2] https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US#vulnerability-summary-1
[3] https://www.theregister.com/2025/12/19/hpe_oneview_rce_bug/
[4] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=2&c=2aV_iu07lnxrSRDd2pRm5iAAAAA4&t=ct%3Dns%26unitnum%3D2%26raptor%3Dcondor%26pos%3Dtop%26test%3D0
[5] https://www.theregister.com/2025/12/30/mongodb_vuln_exploited_cve_2025_14847/
[6] https://www.theregister.com/2025/12/26/end_of_year_tabletop_exercises/
[7] https://www.theregister.com/2025/12/19/watchguard_firebox/
[8] https://www.theregister.com/2025/12/15/amazon_ongoing_gru_campaign/
[9] https://www.esentire.com/security-advisories/poc-released-for-hpe-oneview-vulnerability-cve-2025-37164
[10] https://learn.microsoft.com/en-us/security-updates/securitybulletins/2009/ms09-017
[11] https://pubads.g.doubleclick.net/gampad/jump?co=1&iu=/6978/reg_security/cybercrime&sz=300x50%7C300x100%7C300x250%7C300x251%7C300x252%7C300x600%7C300x601&tile=4&c=44aV_iu07lnxrSRDd2pRm5iAAAAA4&t=ct%3Dns%26unitnum%3D4%26raptor%3Dfalcon%26pos%3Dmid%26test%3D0
[12] https://whitepapers.theregister.com/