CriticalVulnerability

CISA Mandates Emergency Patches for Critical Microsoft Office and HPE OneView Flaws

Federal agencies face a January 28 deadline as CISA escalates two actively exploited vulnerabilities to its Known Exploited Vulnerabilities catalog. With a perfect CVSS 10.0 score, the HPE OneView flaw represents one of the most severe threats currently targeting enterprise infrastructure management systems.

Evan Mael
Evan Mael
Enterprise15views
CVSS Score10.0
CVSS Score (PowerPoint)8.8
Days to Comply21
Affected Versions6
10.0

Maximum CVSS severity score for the HPE OneView vulnerability - the highest possible rating indicating critical risk

The U.S. Cybersecurity and Infrastructure Security Agency has issued an urgent directive requiring federal agencies to address two actively exploited security weaknesses before the end of January. The announcement, made on Wednesday, places particular emphasis on a devastating flaw in Hewlett Packard Enterprise's infrastructure management platform that received the maximum possible severity rating.

Technical Breakdown of the Disclosed Flaws

The first vulnerability affects Microsoft Office PowerPoint through a code injection mechanism. Despite its age, this flaw has resurfaced in active exploitation campaigns, demonstrating how legacy vulnerabilities continue to pose risks when left unpatched.

The second and more severe issue targets HPE OneView—a widely deployed IT infrastructure management solution used by enterprises to oversee their entire technology stack from a single interface. This flaw enables completely unauthenticated attackers to execute malicious code remotely, making it particularly dangerous for organizations exposing these systems to network access.

Scope of Impact and Available Fixes

6

Number of HPE OneView versions (5.20 through 10.20) that require hotfix deployment to remediate the vulnerability

HPE disclosed the OneView vulnerability last month, confirming that every software iteration released before version 11.00 remains susceptible to exploitation. Organizations running older deployments can apply vendor-provided hotfixes covering versions 5.20 through 10.20.

Ongoing Uncertainty Around Attack Attribution

This ambiguity underscores the importance of proactive vulnerability management—organizations cannot afford to wait for attribution before taking protective action when active exploitation has been confirmed by federal authorities.

Frequently Asked Questions

The Known Exploited Vulnerabilities catalog is a maintained database of security flaws that CISA has confirmed are being actively exploited in real-world attacks. Federal agencies are legally required to remediate these vulnerabilities within specified timeframes under BOD 22-01.

CVE-2009-0556 demonstrates that attackers continuously scan for and exploit unpatched legacy systems. Many organizations maintain older software versions, making historical vulnerabilities perpetually relevant until completely remediated across all environments.

While BOD 22-01 only mandates compliance for federal agencies, private enterprises should treat KEV additions as high-priority patches. Implementing the same January 28 deadline provides a reasonable remediation window aligned with federal best practices.

Incident Summary

Type
Vulnerability
Severity
Critical
Industry
Enterprise
Threat Actor
Unknown
Target
Enterprise IT Infrastructure, Federal Agencies
Published
Jan 8, 2026

Comments

Want to join the discussion?

Create an account to unlock exclusive member content, save your favorite articles, and join our community of IT professionals.

Sign in