[German]Brief addendum—vulnerabilities have been discovered in VMware products such as VMware Tools, VMware vCenter, and NSX, which the manufacturer is patching with updates. Here is a brief overview of these issues.
VMware Aria and VMware Tools
Security advisory VMSA-2025-0015: VMware Aria Operations and VMware Tools updates address multiple vulnerabilities (CVE-2025-41244,CVE-2025-41245, CVE-2025-41246) dated September 29, 2025, VMware points out several vulnerabilities in its VMware Tools and VMware Aria.
Local Privilege Escalation vulnerability CVE-2025-41244
VMware Aria Operations and VMware Tools contain a vulnerability CVE-2025-41244, CVSSv3 Base Score of 7.8, which allows local privilege escalation. A malicious local actor without administrator privileges who has access to a VM with VMware Tools installed that is managed by Aria Operations with SDMP enabled can exploit this vulnerability to elevate their privileges to root level on the same VM.
NVISIO.EU has presented an analysis in this blog post, and Bleeping Computer reports here that the vulnerability has been exploited by Chinese hackers since 2024. VMware is providing an update to close the vulnerability. VMware Tools 12.4.9, which is part of VMware Tools 12.5.4, also fixes the issue for Windows 32-bit. A version of open-vm-tools that fixes CVE-2025-41244 is being distributed by Linux vendors.
VMware Aria Operations Information disclosure vulnerability CVE-2025-41245
VMware Aria Operations contains a security vulnerability CVE-2025-41245, CVSSv3 Base Score of 4.9, which could lead to information disclosure. A malicious actor without administrator privileges in Aria Operations can exploit this vulnerability to disclose the login credentials of other Aria Operations users. To fix CVE-2025-41245, install the updates provided by VMware.
VMware vCenter and NSX
Security advisory VMSA-2025-0016: VMware vCenter and NSX updates address multiple vulnerabilities (CVE-2025-41250, CVE-2025-41251, CVE-2025-41252) dated September 29, 2025, VMware points out several vulnerabilities in its VMware vCenter and NX.
vCenter SMTP header injection vulnerability CVE-2025-41250
VMware vCenter contains an SMTP header injection vulnerability CVE-2025-41250, CVSSv3 Base Score of 8.5. A malicious actor without administrator privileges on vCenter, but with permission to create scheduled tasks, may be able to manipulate notification emails sent for scheduled tasks. To fix the vulnerability, install the updates provided by VMware
NSX weak password recovery mechanism vulnerability CVE-2025-41251
VMware NSX contains a vulnerability CVE-2025-41251, CVSSv3 Base Score of 8.1, in the weak password recovery mechanism. An unauthenticated malicious actor can exploit this vulnerability to list valid usernames, which could potentially lead to brute force attacks. To fix CVE-2025-41251, install the updates provided by VMware.
NSX username enumeration vulnerability (CVE-2025-41252)
VMware NSX contains a vulnerability CVE-2025-41252, CVSSv3 Base Score of 7.5, when enumerating usernames. An unauthenticated malicious actor can exploit this vulnerability to list valid usernames, which could lead to unauthorized access attempts. To fix CVE-2025-41252, install the updates provided by VMware.
Similar articles:
VMware OEM portal offline, customers cannot activate VMware licenses
Broadcom ends perpetual licenses for VMware products – End of the free ESXi server?
VMware by Broadcom: "Things are not going well with the Broadcom plans"
Analyses: VMware acts as planned with licenses; switching to alternatives a problem
VMware users: Attention, portal migration to Broadcom on April 30, 2024
VMware Player/Fusion Player is End of Sale; VMware security advisories now at Broadcom
Customer loss at VMware; Customers switch to Nutanix AHV; Bumpy portal switch
VMware by Broadcom signs agreement with Dell, Microsoft, Lenovo and HPE
Did the User Portal migration from VMware to Broadcom work for you?
Interview: VMware takeover by Broadcom, what are the consequences?
Analysis: More than half of VMware customers are planning to leave
VMWare by Broadcom: Next fail with training credits
Has Broadcom's VMware bet paid off? Customers book largest package
VMware vCenter: Update tokens required as of April 23, 2025
VMware sues Siemens for lack of licenses
Next VMWare by Broadcom license hammer: At least 72 cores required
VMWare by Broadcom: 72 core licensing claim withdrawn
VMware ESX update without token: Today (23.4.2025) last day
Broadcom sends cease-and-desist letters to users of VMware perpetual licenses without a maintenance contract
FSAS Technologies suspends VMware partnership from June 2025
CISPE says: VMware has increased prices by 800 to 1500%
VMware kicks lowest partner level (except in Europe)
VMware by Broadcom kicks small and medium-sized partners out of partner program
VMware Explore 2025: Visitor numbers drop to a quarter; VMware for submarines
VMware news: 35% less workload in 3 years, Tesco lawsuit, but strong sales


