{"id":39510,"date":"2025-10-02T00:21:07","date_gmt":"2025-10-01T22:21:07","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=39510"},"modified":"2025-10-02T08:36:38","modified_gmt":"2025-10-02T06:36:38","slug":"vmware-vulnerabilities-aria-vmware-tools-vcenter-and-nsx","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2025\/10\/02\/vmware-vulnerabilities-aria-vmware-tools-vcenter-and-nsx\/","title":{"rendered":"VMware vulnerabilities: Aria, VMware Tools, vCenter, and NSX"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2025\/03\/image-9.png\" alt=\"VMware\" width=\"65\" height=\"65\" align=\"left\" \/>[<a href=\"https:\/\/www.borncity.com\/blog\/2025\/10\/01\/vmware-schwachstellen-vmware-tools-vcenter-und-nsx\/\" target=\"_blank\" rel=\"noopener\">German<\/a>]Brief addendum\u2014vulnerabilities have been discovered in VMware products such as VMware Tools, VMware vCenter, and NSX, which the manufacturer is patching with updates. Here is a brief overview of these issues.<\/p>\n<p><!--more--><\/p>\n<h2>VMware Aria and VMware Tools<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/vg07.met.vgwort.de\/na\/ec6fe3661fb34c9188f5cff233bf9ceb\" alt=\"\" width=\"1\" height=\"1\" \/>Security advisory <a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36149\" target=\"_blank\" rel=\"noopener\">VMSA-2025-0015: VMware Aria Operations and VMware Tools updates address multiple vulnerabilities (CVE-2025-41244,CVE-2025-41245, CVE-2025-41246)<\/a> dated September 29, 2025, VMware points out several vulnerabilities in its VMware Tools and VMware Aria.<\/p>\n<h3>Local Privilege Escalation vulnerability CVE-2025-41244<\/h3>\n<p id=\"VMSA2025VSRCSD27673,VSRCSD48094_ENP-3a.LocalPrivilegeescalationvulnerability(CVE-2025-41244)\">VMware Aria Operations and VMware Tools contain a vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-41244\" target=\"_blank\" rel=\"noopener\">CVE-2025-41244<\/a>, CVSSv3 Base Score of 7.8, which allows local privilege escalation. A malicious local actor without administrator privileges who has access to a VM with VMware Tools installed that is managed by Aria Operations with SDMP enabled can exploit this vulnerability to elevate their privileges to root level on the same VM.<\/p>\n<p>NVISIO.EU has presented an analysis in <a href=\"https:\/\/blog.nviso.eu\/2025\/09\/29\/you-name-it-vmware-elevates-it-cve-2025-41244\/\" target=\"_blank\" rel=\"noopener\">this blog post<\/a>, and Bleeping Computer reports <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/chinese-hackers-exploiting-vmware-zero-day-since-october-2024\/\" target=\"_blank\" rel=\"noopener\">here<\/a> that the vulnerability has been exploited by Chinese hackers since 2024. VMware is providing <a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36149\" target=\"_blank\" rel=\"noopener\">an update<\/a> to close the vulnerability. VMware Tools 12.4.9, which is part of VMware Tools 12.5.4, also fixes the issue for Windows 32-bit. A version of open-vm-tools that fixes CVE-2025-41244 is being distributed by Linux vendors.<\/p>\n<h3>VMware Aria Operations Information disclosure\u00a0vulnerability\u00a0CVE-2025-41245<\/h3>\n<p>VMware Aria Operations contains a security vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-41245\" target=\"_blank\" rel=\"noopener\">CVE-2025-41245<\/a>, CVSSv3 Base Score of 4.9, which could lead to information disclosure. A malicious actor without administrator privileges in Aria Operations can exploit this vulnerability to disclose the login credentials of other Aria Operations users. To fix CVE-2025-41245, install the <a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36149\" target=\"_blank\" rel=\"noopener\">updates<\/a> provided by VMware.<\/p>\n<h2>VMware vCenter and NSX<\/h2>\n<p>Security advisory <a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36150\" target=\"_blank\" rel=\"noopener\">VMSA-2025-0016: VMware vCenter and NSX updates address multiple vulnerabilities (CVE-2025-41250, CVE-2025-41251, CVE-2025-41252)<\/a> dated September 29, 2025, VMware points out several vulnerabilities in its VMware vCenter and NX.<\/p>\n<h3>\u00a0vCenter SMTP header injection\u00a0vulnerability\u00a0CVE-2025-41250<\/h3>\n<p>VMware vCenter contains an SMTP header injection vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-41250\" target=\"_blank\" rel=\"noopener\">CVE-2025-41250<\/a>, CVSSv3 Base Score of 8.5. A malicious actor without administrator privileges on vCenter, but with permission to create scheduled tasks, may be able to manipulate notification emails sent for scheduled tasks. To fix the vulnerability, install the <a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36150\" target=\"_blank\" rel=\"noopener\">updates<\/a> provided by VMware<\/p>\n<h3>NSX weak password recovery mechanism\u00a0vulnerability\u00a0CVE-2025-41251<\/h3>\n<p>VMware NSX contains a vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-41251\" target=\"_blank\" rel=\"noopener\">CVE-2025-41251<\/a>, CVSSv3 Base Score of 8.1, in the weak password recovery mechanism. An unauthenticated malicious actor can exploit this vulnerability to list valid usernames, which could potentially lead to brute force attacks. To fix CVE-2025-41251, install the <a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36150\" target=\"_blank\" rel=\"noopener\">updates<\/a>\u00a0provided by VMware.<\/p>\n<h3>NSX username enumeration\u00a0vulnerability\u00a0(CVE-2025-41252)<\/h3>\n<p>VMware NSX contains a vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-41252\" target=\"_blank\" rel=\"noopener\">CVE-2025-41252<\/a>, CVSSv3 Base Score of 7.5, when enumerating usernames. An unauthenticated malicious actor can exploit this vulnerability to list valid usernames, which could lead to unauthorized access attempts. To fix CVE-2025-41252, install the <a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/36150\" target=\"_blank\" rel=\"noopener\">updates<\/a> provided by VMware.<\/p>\n<p><strong>Similar articles:<br \/>\n<\/strong><a href=\"https:\/\/borncity.com\/win\/2024\/01\/12\/vmware-oem-portal-offline-customers-cannot-activate-vmware-licenses\/\">VMware OEM portal offline, customers cannot activate VMware licenses<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/04\/16\/citrix-license-renewal-currently-not-possible-vmware-deprecates-old-web-client\/\" rel=\"bookmark\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/01\/17\/broadcom-ends-perpetual-licenses-for-vmware-products-end-of-the-free-esxi-server\/\" rel=\"bookmark\">Broadcom ends perpetual licenses for VMware products \u2013 End of the free ESXi server?<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/04\/16\/citrix-license-renewal-currently-not-possible-vmware-deprecates-old-web-client\/\" rel=\"bookmark\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/03\/18\/vmware-by-broadcom-realization-things-are-not-going-well-with-the-broadcom-plans\/\">VMware by Broadcom: \"Things are not going well with the Broadcom plans\"<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/04\/16\/citrix-license-renewal-currently-not-possible-vmware-deprecates-old-web-client\/\" rel=\"bookmark\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/04\/12\/analyses-vmware-acts-as-planned-with-licenses-switching-to-alternatives-a-problem\/\">Analyses: VMware acts as planned with licenses; switching to alternatives a problem<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/04\/16\/citrix-license-renewal-currently-not-possible-vmware-deprecates-old-web-client\/\" rel=\"bookmark\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/04\/13\/vmware-users-attention-portal-migration-to-broadcom-on-april-30-2024\/\" rel=\"bookmark\">VMware users: Attention, portal migration to Broadcom on April 30, 2024<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/03\/02\/private-equity-unternehmen-kkr-kauft-vmware-endkundengeschft-fr-4-milliarden-dollar\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/05\/12\/vmware-player-fusion-player-is-end-of-sale-vmware-security-advisories-now-at-broadcom\/\" rel=\"bookmark\">VMware Player\/Fusion Player is End of Sale; VMware security advisories now at Broadcom<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/03\/02\/private-equity-unternehmen-kkr-kauft-vmware-endkundengeschft-fr-4-milliarden-dollar\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/05\/27\/customer-loss-at-vmware-customers-switch-to-nutanix-ahv-bumpy-portal-switch\/\" rel=\"bookmark\">Customer loss at VMware; Customers switch to Nutanix AHV; Bumpy portal switch<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/03\/02\/private-equity-unternehmen-kkr-kauft-vmware-endkundengeschft-fr-4-milliarden-dollar\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/06\/21\/vmware-by-broadcom-signs-agreement-with-dell-microsoft-lenovo-and-hpe\/\">VMware by Broadcom signs agreement with Dell, Microsoft, Lenovo and HPE<\/a><a href=\"https:\/\/www.borncity.com\/blog\/2024\/03\/02\/private-equity-unternehmen-kkr-kauft-vmware-endkundengeschft-fr-4-milliarden-dollar\/\"><br \/>\n<\/a><a href=\"https:\/\/borncity.com\/win\/2024\/06\/09\/did-the-user-portal-migration-from-vmware-to-broadcom-work-for-you\/\" rel=\"bookmark\">Did the User Portal migration from VMware to Broadcom work for you?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/06\/22\/interview-vmware-takeover-by-broadcom-what-are-the-consequences\/\" rel=\"bookmark\">Interview: VMware takeover by Broadcom, what are the consequences?<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2024\/09\/15\/analysis-more-than-half-of-vmware-customers-are-planning-to-leave\/\" rel=\"bookmark\">Analysis: More than half of VMware customers are planning to leave<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/03\/07\/vmware-by-broadcom-next-fail-with-training-credits\/\" rel=\"bookmark\">VMWare by Broadcom: Next fail with training credits<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/03\/17\/has-broadcoms-vmware-bet-paid-off-customers-book-largest-package\/\" rel=\"bookmark\">Has Broadcom's VMware bet paid off? Customers book largest package<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/03\/26\/vmware-vcenter-update-tokens-required-as-of-april-23-2025\/\">VMware vCenter: Update tokens required as of April 23, 2025<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/03\/29\/vmware-sues-siemens-for-lack-of-licenses\/\">VMware sues Siemens for lack of licenses<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/03\/30\/next-vmware-by-broadcom-license-hammer-at-least-72-cores-required\/\">Next VMWare by Broadcom license hammer: At least 72 cores required<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/11\/vmware-by-broadcom-72-core-licensing-claim-withdrawn\/\" rel=\"bookmark\">VMWare by Broadcom: 72 core licensing claim withdrawn<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/04\/23\/vmware-esx-update-without-token-today-23-4-2025-last-day\/\" rel=\"bookmark\">VMware ESX update without token: Today (23.4.2025) last day<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/05\/08\/broadcom-sends-cease-and-desist-letters-to-users-of-vmware-perpetual-licenses-without-a-maintenance-contract\/\">Broadcom sends cease-and-desist letters to users of VMware perpetual licenses without a maintenance contract<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/05\/22\/fsas-technologies-suspends-vmware-partnership-from-june-2025\/\" rel=\"bookmark\">FSAS Technologies suspends VMware partnership from June 2025<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/05\/26\/cispe-says-vmware-has-increased-prices-by-800-to-1500\/\">CISPE says: VMware has increased prices by 800 to 1500%<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/06\/07\/vmware-kicks-lowest-partner-level-except-in-europe\/\">VMware kicks lowest partner level (except in Europe)<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/07\/29\/vmware-by-broadcom-kicks-small-and-medium-sized-partners-out-of-partner-program\/\">VMware by Broadcom kicks small and medium-sized partners out of partner program<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/09\/05\/vmware-explore-2025-visitor-numbers-drop-to-a-quarter-vmware-for-submarines\/\">VMware Explore 2025: Visitor numbers drop to a quarter; VMware for submarines<\/a><br \/>\n<a href=\"https:\/\/borncity.com\/win\/2025\/09\/13\/vmware-news-35-less-workload-in-3-years-tesco-lawsuit-but-strong-sales\/\" rel=\"bookmark\">VMware news: 35% less workload in 3 years, Tesco lawsuit, but strong sales<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]Brief addendum\u2014vulnerabilities have been discovered in VMware products such as VMware Tools, VMware vCenter, and NSX, which the manufacturer is patching with updates. Here is a brief overview of these issues.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1218],"tags":[69,651,1710],"class_list":["post-39510","post","type-post","status-publish","format-standard","hentry","category-security","category-virtualization","tag-security","tag-virtualization","tag-vmware"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39510","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=39510"}],"version-history":[{"count":4,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39510\/revisions"}],"predecessor-version":[{"id":39514,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/39510\/revisions\/39514"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=39510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=39510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=39510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}