Multiple severe security vulnerabilities in HPE Insight Remote Support (IRS) platform that could allow attackers to execute remote code, traverse directories, and access sensitive information. These vulnerabilities affect versions prior to 7.15.0.646 and pose significant risks to enterprise infrastructure management systems.
Source: https://cybersecuritynews.com/hpe-insight-remote-support-vulnerability/
TPRM report: https://scoringcyber.rankiteo.com/company/hpe
"id": "hpe722060625",
"linkid": "hpe",
"type": "Vulnerability",
"date": "6/2025",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Technology',
'name': 'HPE',
'type': 'Organization'}],
'attack_vector': ['Remote Code Execution',
'Directory Traversal',
'Information Disclosure'],
'data_breach': {'sensitivity_of_data': 'High',
'type_of_data_compromised': ['Configuration files',
'TLS certificates',
'System logs',
'API keys',
'Hardware inventory details',
'Firmware versions']},
'description': 'Multiple severe security vulnerabilities in HPE Insight '
'Remote Support (IRS) platform that could allow attackers to '
'execute remote code, traverse directories, and access '
'sensitive information. The vulnerabilities affect versions '
'prior to 7.15.0.646 and pose significant risks to enterprise '
'infrastructure management systems.',
'impact': {'data_compromised': ['Configuration files',
'TLS certificates',
'System logs',
'API keys',
'Hardware inventory details',
'Firmware versions'],
'systems_affected': ['Enterprise monitoring systems',
'Connected devices',
'Managed servers',
'Connected storage arrays']},
'lessons_learned': 'Regular security assessments and adherence to patch '
'management policies are essential for maintaining secure '
'enterprise environments.',
'post_incident_analysis': {'corrective_actions': ['Patch deployment',
'Network segmentation',
'Access controls',
'Monitoring for suspicious '
'activities'],
'root_causes': 'Improper input validation in IRS’s '
'data processing routines'},
'recommendations': ['Immediate upgrade to version 7.15.0.646 or later',
'Enable automatic updates',
'Implement network segmentation',
'Enhance monitoring for suspicious activities'],
'response': {'enhanced_monitoring': True,
'network_segmentation': True,
'remediation_measures': ['Patch deployment',
'Network segmentation',
'Access controls',
'Monitoring for suspicious activities']},
'title': 'Multiple Severe Security Vulnerabilities in HPE Insight Remote '
'Support (IRS) Platform',
'type': 'Vulnerability Exploitation',
'vulnerability_exploited': ['CVE-2025-37099',
'CVE-2025-37097',
'CVE-2025-37098']}