By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
Computing

CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited

News Room
Last updated: 2026/01/10 at 8:33 AM
News Room Published 10 January 2026
Share
CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
SHARE

Jan 08, 2026Ravie LakshmananVulnerability / KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday added two security flaws impacting Microsoft Office and Hewlett Packard Enterprise (HPE) OneView to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

The vulnerabilities are listed below –

  • CVE-2009-0556 (CVSS score: 8.8) – A code injection vulnerability in Microsoft Office PowerPoint that allows remote attackers to execute arbitrary code by means of memory corruption
  • CVE-2025-37164 (CVSS score: 10.0) – A code injection vulnerability in HPW OneView that allows a remote unauthenticated user to perform remote code execution

Details of CVE-2025-37164 emerged last month when HPE said the vulnerability impacts all versions of the software prior to version 11.00. The company also made available hotfixes for OneView versions 5.20 through 10.

Cybersecurity

The scope and source of the attacks targeting the two flaws is presently unclear, and there appear to be no public reports referencing their exploitation in the wild. However, a report from eSentire on December 23, 2025, revealed the release of a detailed proof-of-concept (PoC) exploit for CVE-2025-37164.

“Public availability of PoC exploit code significantly increases the risk to organizations running affected versions of the application,” eSentire said. “As the vulnerability impacts all versions prior to 11.0, organizations are strongly advised to apply the required updates to mitigate the potential risk of exploitation.”

Pursuant to Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies are recommended to apply the necessary fixes by January 28, 2026, to secure their networks against active threats.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article All the ways to unlock Freely’s FREE TV – the models & boxes for extra channels All the ways to unlock Freely’s FREE TV – the models & boxes for extra channels
Next Article I (finally) ditched Google Photos for self-hosted; here’s how it went I (finally) ditched Google Photos for self-hosted; here’s how it went
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

China Unicom opens eSIM pre-registration as rivals prepare to follow · TechNode
China Unicom opens eSIM pre-registration as rivals prepare to follow · TechNode
Computing
Addiction Treatment: A Comprehensive Guide to Recovery and Lasting Healing
Addiction Treatment: A Comprehensive Guide to Recovery and Lasting Healing
Gadget
This User-Friendly PDF Editor Is on Sale and You Won’t Believe How Inexpensive It Is
This User-Friendly PDF Editor Is on Sale and You Won’t Believe How Inexpensive It Is
News
Go: The Testing/Synctest Package Explained | HackerNoon
Go: The Testing/Synctest Package Explained | HackerNoon
Computing

You Might also Like

China Unicom opens eSIM pre-registration as rivals prepare to follow · TechNode
Computing

China Unicom opens eSIM pre-registration as rivals prepare to follow · TechNode

1 Min Read
Go: The Testing/Synctest Package Explained | HackerNoon
Computing

Go: The Testing/Synctest Package Explained | HackerNoon

38 Min Read
China launches 2025 subsidy programs for electronics · TechNode
Computing

China launches 2025 subsidy programs for electronics · TechNode

2 Min Read
The HackerNoon Newsletter: Should You Trust Your VPN Location? (1/11/2026) | HackerNoon
Computing

The HackerNoon Newsletter: Should You Trust Your VPN Location? (1/11/2026) | HackerNoon

4 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?