Categories: Cyber Security News

VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands

Broadcom’s VMware division has disclosed critical security vulnerabilities in its virtualization products, including a high-severity flaw that could allow authenticated users to execute arbitrary commands on affected systems.

Today’s security advisory addresses four distinct vulnerabilities affecting multiple VMware products with severity ratings ranging from Moderate to Important.

Critical Command Execution Vulnerability

The most severe vulnerability, CVE-2025-41225, affects VMware vCenter Server and carries a CVSS score of 8.8. This authenticated command-execution vulnerability allows malicious actors with privileges to create or modify alarms and run script actions to execute arbitrary commands on the vCenter Server.

Security experts consider this vulnerability particularly dangerous as it provides attackers with a direct path to compromise core virtualization management infrastructure.

“This vulnerability represents a significant risk to enterprise environments where vCenter Server manages critical workloads,” said a spokesperson from the VMware security team. “Organizations should prioritize patching immediately to prevent potential exploitation.”

Other Vulnerabilities Patched

The advisory also addresses three other security flaws:

  • CVE-2025-41226: A denial-of-service vulnerability in ESXi when performing guest operations (CVSS score of 6.8). This vulnerability allows attackers with guest operating privileges to create denial-of-service conditions affecting virtual machines running VMware Tools.
  • CVE-2025-41227: A denial-of-service vulnerability in Workstation, Fusion, and ESXi due to certain guest options (CVSS score of 5.5). Non-administrative users within a guest operating system can exploit this issue by exhausting memory resources of the host process.
  • CVE-2025-41228: A reflected cross-site scripting vulnerability in ESXi and vCenter Server login pages (CVSS score of 4.3). Attackers with network access to specific URL paths can exploit this issue to steal cookies or redirect users to malicious websites.

The vulnerabilities impact a wide range of VMware products, including ESXi 7.0 and 8.0, vCenter Server 7.0 and 8.0, and Workstation 17.x, Fusion 13.x, VMware Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure.

VMware has released updates to address these vulnerabilities. For vCenter Server, users should update to version 8.0 U3e or 7.0 U3v, depending on their current version.

ESXi customers should apply patches ESXi80U3se-24659227 (for version 8.0) or ESXi70U3sv-24723868 (for version 7.0). VMware Workstation and Fusion users should update to versions 17.6.3 and 13.6.3, respectively.

This advisory comes amid increasing attention on VMware product security. Earlier this month, Broadcom addressed three other significant vulnerabilities in the VMware Cloud Foundation platform that allowed attackers to gain unauthorized access to sensitive information and internal services.

In March, Broadcom issued an advisory addressing three critical exploited vulnerabilities in VMware ESXi that, when chained together, allowed attackers to access hypervisors by running virtual machines.

All organizations running affected VMware products should implement the provided patches immediately, as no workarounds are available for these vulnerabilities.

Given VMware’s dominant position in enterprise virtualization, these vulnerabilities represent significant risks to organizational security postures.

Equip your SOC team with deep threat analysis for faster response -> Get Extra Sandbox Licenses for Free

The post VMware ESXi & vCenter Vulnerability Let Attackers Run Arbitrary Commands appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Jodi’s Journal: The rest of the story behind Forward Sioux Falls

May 10, 2026 Imagine if the biggest, most influential businesses in this country came together…

22 minutes ago

Crimson Desert Adds Surprise Claw Machine Mini-Game and Lets Pet Dogs Attack Enemies as Part of Update 1.06.00

Crimson Desert developer Pearl Abyss has released this week’s update as promised, and it adds…

27 minutes ago

Nearly 50 Years Later, WKRP in Cincinnati Becomes a Real Radio Station

It took nearly 50 years. WKRP in Cincinnati is no longer just a TV sitcom.…

32 minutes ago

Record turnout, beautiful weather highlight Friday’s Chamber Golf Tournament at Big Creek

The Mountain Home Area Chamber of Commerce hosted its 2026 Four-Person Scramble Golf Tournament Friday…

40 minutes ago

Lead Hill man competes on Netflix reality show “Million Dollar Secret”

Growing up and spending all of his 44-years in Lead Hill and living on the…

41 minutes ago

MH Mayor Adams gives update on community center progress

Mountain Home Mayor Hillrey Adams says work is continuing at a rapid pace as the…

42 minutes ago

This website uses cookies.