Today’s security advisory addresses four distinct vulnerabilities affecting multiple VMware products with severity ratings ranging from Moderate to Important.
The most severe vulnerability, CVE-2025-41225, affects VMware vCenter Server and carries a CVSS score of 8.8. This authenticated command-execution vulnerability allows malicious actors with privileges to create or modify alarms and run script actions to execute arbitrary commands on the vCenter Server.
Security experts consider this vulnerability particularly dangerous as it provides attackers with a direct path to compromise core virtualization management infrastructure.
“This vulnerability represents a significant risk to enterprise environments where vCenter Server manages critical workloads,” said a spokesperson from the VMware security team. “Organizations should prioritize patching immediately to prevent potential exploitation.”
The advisory also addresses three other security flaws:
The vulnerabilities impact a wide range of VMware products, including ESXi 7.0 and 8.0, vCenter Server 7.0 and 8.0, and Workstation 17.x, Fusion 13.x, VMware Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure.
VMware has released updates to address these vulnerabilities. For vCenter Server, users should update to version 8.0 U3e or 7.0 U3v, depending on their current version.
ESXi customers should apply patches ESXi80U3se-24659227 (for version 8.0) or ESXi70U3sv-24723868 (for version 7.0). VMware Workstation and Fusion users should update to versions 17.6.3 and 13.6.3, respectively.
This advisory comes amid increasing attention on VMware product security. Earlier this month, Broadcom addressed three other significant vulnerabilities in the VMware Cloud Foundation platform that allowed attackers to gain unauthorized access to sensitive information and internal services.
In March, Broadcom issued an advisory addressing three critical exploited vulnerabilities in VMware ESXi that, when chained together, allowed attackers to access hypervisors by running virtual machines.
All organizations running affected VMware products should implement the provided patches immediately, as no workarounds are available for these vulnerabilities.
Given VMware’s dominant position in enterprise virtualization, these vulnerabilities represent significant risks to organizational security postures.
Equip your SOC team with deep threat analysis for faster response -> Get Extra Sandbox Licenses for Free
The post VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands appeared first on Cyber Security News.
May 10, 2026 Imagine if the biggest, most influential businesses in this country came together…
Crimson Desert developer Pearl Abyss has released this week’s update as promised, and it adds…
It took nearly 50 years. WKRP in Cincinnati is no longer just a TV sitcom.…
The Mountain Home Area Chamber of Commerce hosted its 2026 Four-Person Scramble Golf Tournament Friday…
Growing up and spending all of his 44-years in Lead Hill and living on the…
Mountain Home Mayor Hillrey Adams says work is continuing at a rapid pace as the…
This website uses cookies.