Check Point Research has reported a wave of exploitation attempts against a vulnerability in HPE OneView, with activity tied to the Linux-based RondoDox botnet. According to Infosecurity Magazine’s report on the findings, the campaign appears to involve broad internet scanning and automated exploitation rather than a narrowly targeted intrusion set.
HPE OneView is used to manage servers, storage and networking in enterprise and data center environments, which makes it a more sensitive target than a typical exposed web service. A successful compromise could give attackers a foothold in a trusted management plane, where systems often have elevated privileges and visibility across infrastructure.
Check Point’s findings fit a familiar pattern: once details of a flaw in an enterprise appliance or management platform become public, botnet operators move quickly to weaponize it at scale. RondoDox has previously been associated with Linux-focused attacks that pull vulnerable systems into botnet infrastructure for follow-on abuse such as distributed denial-of-service attacks, proxying, or additional malware delivery.
At the time of reporting, the public summary did not include extensive indicators of compromise or victim details. It also did not clarify in the news report which exact CVE was involved, so defenders should verify the affected HPE OneView versions and available fixes directly through HPE advisories and the underlying Check Point research. For organizations that expose administrative tools remotely, restricting access through a VPN or dedicated management network can reduce risk while patches are applied.
The immediate concern is exposure. Internet-facing management interfaces remain a frequent entry point for opportunistic malware operators because they are easy to scan and often sit in high-trust network zones. Security teams using HPE OneView should review external exposure, apply vendor updates, and monitor for unusual outbound traffic or command execution on management hosts.
Sources: Infosecurity Magazine; HPE Security Bulletins.




