RondoDox botnet linked to large-scale exploit of critical HPE OneView bug

A critical HPE OneView flaw is now being exploited at scale, with Check Point tying mass, automated attacks to the RondoDox botnet.

The security outfit says it has identified "large-scale exploitation" of CVE-2025-37164, a maximum-severity remote code execution bug in HPE's data center management platform. Check Point has tied the activity to RondoDox, a Linux-based botnet that weaponizes publicly known vulnerabilities across routers, DVRs, web servers, and other devices, using an "exploit-shotgun" approach to build sprawling botnet networks for DDoS, cryptomining, and secondary payload delivery.

When HPE first disclosed the bug in mid-December, its fix was greeted with urgency because of its perfect 10 CVSS severity score and the fact that OneView controls servers, storage, and networking from a central point - essentially a high-privilege command center inside many enterprise environments.

At that stage, the big unknown was whether miscreants were moving past proof-of-concept exploitation to full-blown campaigns. Now that uncertainty is gone, tens of thousands of exploit attempts have been observed, Check Point's telemetry shows, with automated scanners targeting vulnerable systems en masse.

The firm says it observed a "dramatic escalation" in exploit activity on January 7, the same day the flaw was added to CISA's list of actively exploited flaws.

"Between 05:45 and 09:20 UTC, we recorded more than 40,000 attack attempts exploiting CVE-2025-37164," Check Point said in a Thursday blog post. "Analysis indicates that these attempts were automated, botnet-driven exploitation.

"We attribute this activity to the RondoDox botnet based on a distinctive user agent string and the commands observed, including those designed to download RondoDox malware from remote hosts."

Check Point says the majority of the activity came from a single Dutch IP address already well known in threat intel circles, suggesting a particularly active operator.

It added that the attacks were global, with the United States seeing the highest volume, followed by Australia, France, Germany, and Austria, and activity concentrated mainly against government organizations, along with financial services and industrial manufacturers.

HPE has yet to respond to The Register's questions on Friday, but told us earlier this month that while it had not received reports from customers of the vulnerability being exploited, "it is important that OneView users apply the patch as soon as possible."

If there's a takeaway from the latest OneView drama, it's that management platforms can no longer be left to rot on long patch cycles - because the adversaries definitely won't wait. ®

Search
About Us
Website HardCracked provides softwares, patches, cracks and keygens. If you have software or keygens to share, feel free to submit it to us here. Also you may contact us if you have software that needs to be removed from our website. Thanks for use our service!
IT News
Feb 7
Whether they are building agents or folding proteins, LLMs need a friend

interview AI pioneer Vishal Sikka warns to never trust an LLM that runs alone

Feb 7
Study confirms experience beats youthful enthusiasm

Research shows productivity and judgment peak decades after graduation

Feb 6
Four horsemen of the AI-pocalypse line up capex bigger than Israel's GDP

AIpocolypse Amazon, Google, Meta, Microsoft eye $635B in infrastructure spend

Feb 6
Supermarket sorry after facial recognition alert flags right criminal, wrong customer

System worked as intended, but staff then kicked out innocent bystander

Feb 6
Microsoft starts the countdown for the end of Exchange Web Services

Windows giant might try turning it off and on again to see who notices

Feb 6
Romanian rail workers accused of bribery turned to ChatGPT for legal tips

Corruption probe takes detour as staff facing trial reportedly asked AI if seat-blocking scams caused financial damage