The Cybersecurity and Infrastructure Security Agency has added two critical vulnerabilities to its Known Exploited Vulnerabilities catalog: a maximum-severity flaw in HPE OneView management software and a 15-year-old PowerPoint code execution vulnerability, requiring immediate federal agency remediation.

The Cybersecurity and Infrastructure Security Agency (CISA) has issued binding remediation requirements under Binding Operational Directive 22-01 for two newly added vulnerabilities in its Known Exploited Vulnerabilities (KEV) catalog. Federal agencies must immediately address:
CVE-2025-37164 (CVSS 10.0):
- Affects HPE OneView infrastructure management software
- Allows remote code execution granting full system control
- HPE Security Advisory released December 18, 2026
- Exploit code publicly available since disclosure
CVE-2009-0556 (CVSS 8.8):
- Microsoft PowerPoint memory corruption vulnerability
- Patched in 2009 via MS09-017
- Exploited through malicious PowerPoint files
- Impacts unpatched legacy Office installations
Compliance Requirements
Per BOD 22-01:
- Federal agencies must remediate both vulnerabilities by February 7, 2026 (30 days from catalog entry)
- Non-federal entities should treat as high-priority remediation targets
- Organizations must:
- Identify all systems running HPE OneView
- Inventory Microsoft Office installations (including legacy versions)
- Apply HPE firmware updates and Microsoft security patches
- Implement temporary mitigations where patching isn't immediately feasible
Risk Analysis
- HPE OneView Exploit: Compromise provides administrative control over servers, storage, and network infrastructure. Rapid7's proof-of-concept exploit confirms trivial weaponization.
- Legacy PowerPoint Vulnerability: Despite being patched in 2009, unmanaged systems remain vulnerable. Attackers leverage this gap in outdated environments lacking patch management.
Remediation Timeline
| Action Item | Deadline |
|---|---|
| Asset inventory completion | January 15, 2026 |
| HPE patch deployment | January 22, 2026 |
| Office patch verification (including legacy systems) | January 29, 2026 |
| CISA compliance validation | February 7, 2026 |
Mitigation Strategies
For HPE OneView:
- Restrict management interface access to authorized IPs
- Implement network segmentation for OneView components
For legacy Office systems:
- Block .ppt file attachments in email gateways
- Migrate to Microsoft 365 supported versions
- Apply Group Policy restrictions for macro execution
Compliance officers must prioritize these vulnerabilities regardless of age—both are confirmed as actively exploited attack vectors. Organizations failing to meet CISA's deadline risk operational disruption and potential breach notification requirements under incident reporting regulations.

Comments
Please log in or register to join the discussion