VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)

VMware Cloud Foundation

6 more products

35877

15 July 2025

15 July 2025

OPEN

CRITICAL

6.2-9.3

None

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

Advisory ID:  VMSA-2025-0013
Advisory Severity: Critical
CVSSv3 Range: 6.2-9.3
Synopsis: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)
Issue date: 2025-07-15
Updated on: 2025-07-15 (Initial Advisory)
CVE(s)

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

 

1. Impacted Products

  • VMware Cloud Foundation
  • VMware vSphere Foundation
  • VMware ESXi
  • VMware Workstation Pro 
  • VMware Fusion 
  • VMware Tools
  • VMware Telco Cloud Platform
  • VMware Telco Cloud Infrastructure

2. Introduction

Multiple vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools were privately reported to Broadcom. Updates are available to remediate these vulnerabilities in affected Broadcom products. 

3a. VMXNET3 integer-overflow vulnerability (CVE-2025-41236) 

Description: 
VMware ESXi, Workstation, and Fusion contain an integer-overflow vulnerability in the VMXNET3 virtual network adapter. Broadcom has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.3.

Known Attack Vectors:
A malicious actor with local administrative privileges on a virtual machine with VMXNET3 virtual network adapter may exploit this issue to execute code on the host. Non VMXNET3 virtual adapters are not affected by this issue.

Resolution: 
To remediate CVE-2025-41236 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds:
None

Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0013-qna.

Acknowledgments: 
Broadcom would like to thank Nguyen Hoang Thach (@hi_im_d4rkn3ss) of STARLabs SG working with the Pwn2Own held by Zero day initiative for reporting this issue to us.

Notes:
None.

3b. VMCI integer-underflow vulnerability (CVE-2025-41237) 

Description: 
VMware ESXi, Workstation, and Fusion contain an integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write. Broadcom has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.3.

Known Attack Vectors:
A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

Resolution: 
To remediate CVE-2025-41237 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds:
None

Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0013-qna.

Acknowledgments: 
Broadcom would like to thank Corentin BAYET (@OnlyTheDuck) of REverse Tactics (@Reverse_Tactics) working with the Pwn2Own held by Zero day initiative for reporting this issue to us.

Notes:
None

3c. PVSCSI heap-overflow vulnerability (CVE-2025-41238)

Description: 
VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write. Broadcom has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.3.

Known Attack Vectors:
A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

Resolution: 
To remediate CVE-2025-41238 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds:
None

Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0013-qna.

Acknowledgments: 
Broadcom would like to thank Thomas Bouzerar (@MajorTomSec) and Etienne Helluy-Lafont of Synacktiv working with the Pwn2Own held by Zero day initiative for reporting this issue to us.

Notes:
None.

3d. vSockets information-disclosure vulnerability (CVE-2025-41239)

Description: 
VMware ESXi, Workstation, Fusion, and VMware Tools contains an information disclosure vulnerability due to the usage of an uninitialised memory in vSockets. Broadcom has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.1.

Known Attack Vectors:
A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to leak memory from processes communicating with vSockets.

Resolution:
To remediate CVE-2025-41239 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds:
None

Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0013-qna.

Acknowledgments: 
Broadcom would like to thank Corentin BAYET (@OnlyTheDuck) of REverse Tactics (@Reverse_Tactics) working with the Pwn2Own held by Zero day initiative and Gwangun Jung of THEORI working with Trend Micro Zero Day Initiative for independently reporting this issue to us.

Notes:
[1] CVE-2025-41239 affects VMware Tools for Windows. Please check the FAQ for additional guidance if you are running VMware Tools for Windows.  
[2] VMware Tools 12.4.8 which is part of VMware Tools 12.5.3, also addresses the issue for Windows 32-bit.

Response Matrix: 

VMware Product

Component

Version

Running On

CVE

CVSSv3

Severity

Fixed Version

Workarounds

Additional Documentation

VMware Cloud Foundation,

VMware vSphere Foundation

ESX 9.0.0.0 Any CVE-2025-41236, CVE-2025-41238, CVE-2025-41239 N/A N/A Unaffected N/A N/A
ESX 9.0.0.0 Any CVE-2025-41237 8.4 Important ESXi-9.0.0.0100-24813472 None

Additional guidance for updating VMware Tools asynchronously is available in the FAQ.

VMware Tools [1] 13.0.0.0 Windows CVE-2025-41239 6.2 Moderate 13.0.1.0 None FAQ
VMware ESXi N/A 8.0 Any CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239 9.3, 8.4, 7.4, 7.1 Critical ESXi80U3f-24784735 None

Additional guidance for updating VMware Tools asynchronously is available in the FAQ.

VMware ESXi N/A 8.0 Any CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239 9.3, 8.4, 7.4, 7.1 Critical ESXi80U2e-24789317 None Additional guidance for updating VMware Tools asynchronously is available in the FAQ.
VMware ESXi N/A 7.0  Any CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239 9.3, 8.4, 7.4, 7.1 Critical ESXi70U3w-24784741 None Additional guidance for updating VMware Tools asynchronously is available in the FAQ.
VMware Workstation N/A 17.x Any

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

9.3, 9.3, 9.3, 7.1 Critical 17.6.4 None FAQ
VMware Fusion N/A 13.x Any

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

9.3, 9.3, 9.3, 7.1 Critical 13.6.4 None FAQ
VMware Cloud Foundation  N/A 5.x Any

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

9.3, 8.4, 7.4, 7.1 Critical Async patch to ESXi80U3f-24784735 None Async Patching Guide: KB88287
VMware Cloud Foundation  N/A 4.5.x Any

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

9.3, 8.4, 7.4, 7.1 Critical Async patch to ESXi70U3w-24784741 None Async Patching Guide: KB88287
VMware Telco Cloud Platform N/A 5.x, 4.x Any

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

9.3, 8.4, 7.4, 7.1 Critical ESXi80U3f-24784735 None FAQ
VMware Telco Cloud Platform N/A 3.x, 2.x Any

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

9.3, 8.4, 7.4, 7.1 Critical ESXi70U3w-24784741 None FAQ
VMware Telco Cloud Infrastructure N/A 3.x, 2.x  Any

CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239

9.3, 8.4, 7.4, 7.1 Critical ESXi70U3w-24784741   FAQ
VMware Tools [1] N/A 13.x.x Windows

CVE-2025-41239

6.2 Moderate  13.0.1.0 None FAQ

VMware Tools [1]

N/A 12.x.x, 11.x.x Windows CVE-2025-41239 6.2 Moderate

 12.5.3 [2]

None

FAQ 

VMware Tools

N/A 13.x.x, 12.x.x, 11.x.x Linux CVE-2025-41239 N/A N/A

Unaffected

N/A

N/A

VMware Tools

N/A 13.x.x, 12.x.x, 11.x.x macOS CVE-2025-41239 N/A N/A

Unaffected

N/A

N/A

  

4. References

VMware Cloud Foundation 9.0.0.0.0
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?displayGroup=VMware%20Cloud%20Foundation%209&release=9.0.0.0&os=&servicePk=&language=EN&groupId=529537&viewGroup=true

VMware vSphere Foundation 9.0.0.0.0
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?displayGroup=VMware%20vSphere%20Foundation%209&release=9.0.0.0&os=&servicePk=&language=EN&groupId=529542&viewGroup=true

VMware ESXi 8.0 ESXi80U3f-24784735
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=15938
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3f-release-notes.html

VMware ESXi 8.0 ESXi80U2e-24789317
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=15939
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2e-release-notes.html

VMware ESXi 7.0 ESXi70U3w-24784741
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=15940
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3w-release-notes.html

VMware Workstation 17.6.4
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productdownloads?subfamily=VMware%20Workstation%20Pro&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/workstation-pro/17-0/release-notes/vmware-workstation-1764-pro-release-notes.html

VMware Fusion 13.6.4
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productdownloads?subfamily=VMware%20Fusion&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/fusion-pro/13-0/release-notes/vmware-fusion-1364-release-notes.html

VMware Cloud Foundation 5.x, 4.5.x
Downloads and Documentation:
https://knowledge.broadcom.com/external/article?legacyId=88287

VMware Tools 13.0.1.0
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Tools&displayGroup=VMware%20Tools%2013.x&release=13.0.1.0&os=&servicePk=&language=EN&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/tools/13-0-0/release-notes/vmware-tools-1301-release-notes.html

VMware Tools 12.5.3
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Tools&displayGroup=VMware%20Tools%2012.x&release=12.5.3&os=&servicePk=&language=EN&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/tools/12-5-0/release-notes/vmware-tools-1253-release-notes.html

Mitre CVE Dictionary Links:
https://www.cve.org/CVERecord?id=CVE-2025-41236 
https://www.cve.org/CVERecord?id=CVE-2025-41237 
https://www.cve.org/CVERecord?id=CVE-2025-41238 
https://www.cve.org/CVERecord?id=CVE-2025-41239 

FIRST CVSSv3 Calculator:
CVE-2025-41236: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2025-41237:
ESXi: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Workstation/Fusion: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2025-41238: 
ESXi: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Workstation/Fusion: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2025-41239:
ESXi/Workstation/Fusion: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
Tools: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5. Change Log:

2025-07-15 VMSA-2025-0013
Initial security advisory.

6. Contact:

E-mail: [email protected]

PGP key
https://knowledge.broadcom.com/external/article/321551

VMware Security Advisories
https://www.broadcom.com/support/vmware-security-advisories

VMware External Vulnerability Response and Remediation Policy
https://www.broadcom.com/support/vmware-services/security-response

VMware Lifecycle Support Phases
https://support.broadcom.com/group/ecx/productlifecycle

VMware Security Blog
https://blogs.vmware.com/security

X
https://x.com/VMwareSRC

Copyright 2025 Broadcom. All rights reserved.