VMSA-2025-0010 – Critical VMware Vulnerabilities: What You Need to Know and Why You Should Patch Now

Broadcom (VMware) has just released VMSA-2025-0010, a security advisory detailing multiple vulnerabilities across vCenter Server, ESXi, Workstation, and Fusion. While not all of them are critical, one vulnerability in particular stands out due to its potential for authenticated command execution, warranting immediate action from IT teams.

Let’s break down the impact, affected components, and what you should do next.

Summary of the Key Vulnerabilities

1. CVE-2025-41225Authenticated Command Execution in vCenter Server

  • CVSSv3 Score: 8.8 (High)
  • Impact: An authenticated user with permission to create or modify alarms and run scripts can execute arbitrary commands on the vCenter Server.
  • Risk: If exploited, this could allow attackers to gain control of the underlying server, a major concern for enterprise environments.

2. CVE-2025-41226Guest Operations Denial-of-Service in ESXi

  • CVSSv3 Score: 6.8 (Moderate)
  • Impact: Attackers with guest operation privileges can exploit this to crash guest VMs using VMware Tools and guest operations APIs.

3. CVE-2025-41227Memory Exhaustion DoS in ESXi/Workstation/Fusion

  • CVSSv3 Score: 5.5 (Moderate)
  • Impact: A user inside a VM can exhaust memory of the host process, leading to a denial-of-service of other running VMs or services.

4. CVE-2025-41228Reflected XSS in ESXi and vCenter Server

  • CVSSv3 Score: 4.3 (Low)
  • Impact: Could allow a remote attacker to redirect users or steal cookies if they access specially crafted URLs.

Affected VMware Products

ProductAffected Version(s)Fixed Version
vCenter ServerVarious 7.x and 8.x builds7.0 U3x and 8.0 U2x (latest patch)
ESXi6.7, 7.0, 8.0Update to fixed versions per advisory
Workstation ProPre-17.5.x17.5.2 or later
FusionPre-13.5.x13.5.2 or later
Cloud Foundation, Telco CloudMultiple versionsRefer to Broadcom advisory matrix

Why This Matters

While the Denial-of-Service and XSS issues pose moderate threats, the vCenter authenticated command execution flaw (CVE-2025-41225) is the most urgent. It essentially gives privileged users the ability to run arbitrary system-level commands on one of the most critical infrastructure components.

This could be exploited by:

  • Malicious insiders
  • Compromised accounts via phishing
  • Automated attacks leveraging misconfigured roles

What You Should Do Right Now

Leave a Reply

Your email address will not be published. Required fields are marked *