A critical security updates addressing four vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools that could allow attackers with administrative privileges on virtual machines to execute malicious code on the underlying host systems.
The vulnerabilities, identified as CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, and CVE-2025-41239, carry CVSS scores ranging from 6.2 to 9.3, with three rated as critical severity.
Security researchers discovered these vulnerabilities during Pwn2Own competitions and reported them through the Zero Day Initiative, prompting immediate patches from Broadcom.
The most severe vulnerabilities identified in this security advisory present significant risks to virtualized environments:
The third critical vulnerability, CVE-2025-41238, targets the Paravirtualized SCSI (PVSCSI) controller through a heap-overflow condition resulting in out-of-bounds writes.
With a CVSS score of 9.3, this vulnerability enables similar attack vectors as the VMCI vulnerability, allowing local administrators to execute code as the VMX process.
However, ESXi environments experience limited impact as exploitation requires unsupported configurations and remains contained within the VMX sandbox.
Thomas Bouzerar and Etienne Helluy-Lafont of Synacktiv discovered this vulnerability, also during Pwn2Own competitions.
The exploitation scenarios vary significantly between platforms. ESXi deployments benefit from sandboxing mechanisms that contain potential attacks, while Workstation and Fusion environments face direct host system compromise risks.
These distinctions highlight the importance of platform-specific security considerations when assessing vulnerabilities impact.
The fourth vulnerability, CVE-2025-41239, represents an information disclosure issue in vSockets functionality affecting ESXi, Workstation, Fusion, and VMware Tools.
With a CVSS score of 7.1, this vulnerability stems from uninitialized memory usage, potentially allowing attackers to leak sensitive information from processes communicating through vSockets.
According to Report, Broadcom emphasizes that no workarounds exist for these vulnerabilities, making immediate patching essential for all affected environments.
Independent researchers Corentin Bayet and Gwangun Jung of THEORI separately identified this vulnerability.
The company has released comprehensive patches across its product portfolio, including VMware Cloud Foundation, vSphere Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure.
Organizations should prioritize these updates given the critical nature of the vulnerabilities and the potential for host system compromise through virtual machine escape techniques.
Find this Story Interesting! Follow us on LinkedIn and X to Get More Instant Updates.
PortSwigger has leveled up Burp Suite's scanning arsenal with the latest Active Scan++ extension, version…
Unit 42 researchers at Palo Alto Networks exposed serious flaws in the Model Context Protocol…
Polish police have arrested three Ukrainian men traveling through Europe and seized a cache of…
Google has launched its most significant Chrome update ever, embedding Gemini AI across the browser…
Attackers exploit this vulnerability through the router's web interface components, specifically "cgibin" and "hnap_main," by…
Security researchers have uncovered a severe flaw in Apache Tika, a popular open-source toolkit for…