VMSA-2025-0010 : VMware ESXi, vCenter Server, Workstation, and Fusion updates address multiple vulnerabilities (CVE-2025-41225, CVE-2025-41226, CVE-2025-41227, CVE-2025-41228)
25717
20 May 2025
20 May 2025
OPEN
HIGH
4.3-8.8
None
CVE-2025-41225, CVE-2025-41226, CVE-2025-41227, CVE-2025-41228
Advisory ID: | VMSA-2025-0010 |
Advisory Severity: | Important |
CVSSv3 Range: | 4.3-8.8 |
Synopsis: | VMware ESXi, vCenter Server, Workstation, and Fusion updates address multiple vulnerabilities (CVE-2025-41225, CVE-2025-41226, CVE-2025-41227, CVE-2025-41228) |
Issue date: | 2025-05-20 |
Updated on: | 2025-05-20 (Initial Advisory) |
CVE(s) |
CVE-2025-41225, CVE-2025-41226, CVE-2025-41227, CVE-2025-41228 |
1. Impacted Products
- VMware ESXi
- VMware vCenter Server
- VMware Workstation Pro
- VMware Fusion
- VMware Cloud Foundation
- VMware Telco Cloud Platform
- VMware Telco Cloud Infrastructure
2. Introduction
Multiple vulnerabilities in ESXi, vCenter Server, and Workstation were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.
3a. VMware vCenter Server authenticated command-execution vulnerability (CVE-2025-41225)
Description:
The vCenter Server contains an authenticated command-execution vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.8.
Known Attack Vectors:
A malicious actor with privileges to create or modify alarms and run script action may exploit this issue to run arbitrary commands on the vCenter Server.
Resolution:
To remediate CVE-2025-41225 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
None.
Acknowledgments:
VMware would like to thank Oliver Bachtik and Bert De Bruijn for reporting this issue to us.
Notes:
None.
3b. Guest Operations Denial-of-Service Vulnerability (CVE-2025-41226)
Description:
VMware ESXi contains a denial-of-service vulnerability that occurs when performing a guest operation. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 6.8.
Known Attack Vectors:
A malicious actor with guest operation privileges on a VM, who is already authenticated through vCenter Server or ESXi may trigger this issue to create a denial-of-service condition of guest VMs with VMware Tools running and guest operations enabled.
Resolution:
To remediate CVE-2025-41226 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
None.
Acknowledgments:
VMware would like to thank security researcher Tom Jøran Sønstebyseter Rønning (@L1v1ng0ffTh3L4N) of Statnett (Norway) and Uros Orozel for independently reporting this issue to us.
Notes:
None.
3c. Denial-of-Service Vulnerability (CVE-2025-41227)
Description:
VMware ESXi, Workstation, and Fusion contain a denial-of-service vulnerability due to certain guest options. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.5.
Known Attack Vectors:
A malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition.
Resolution:
To remediate CVE-2025-41227 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
None.
Acknowledgments:
VMware would like to thank the National Security Agency for reporting this issue to us.
Notes:
None.
3d. VMware ESXi and vCenter Server Reflected Cross Site Scripting (XSS) Vulnerability (CVE-2025-41228)
Description:
VMware ESXi and vCenter Server contain a reflected cross-site scripting vulnerability due to improper input validation. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.3.
Known Attack Vectors:
A malicious actor with network access to the login page of certain ESXi host or vCenter Server URL paths may exploit this issue to steal cookies or redirect to malicious websites.
Resolution:
To remediate CVE-2025-41228 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments.
Workarounds:
None.
Additional Documentation:
None.
Acknowledgments:
VMware would like to thank Huang for reporting this issue to us.
Notes:
None.
Response Matrix:
VMware Product |
Version |
Running On |
CVE |
CVSSv3 |
Severity |
Fixed Version |
Workarounds |
Additional Documentation |
---|---|---|---|---|---|---|---|---|
vCenter Server | 8.0 | Any | CVE-2025-41225, CVE-2025-41228 | 8.8, 4.3 | Important | 8.0 U3e | None | None |
vCenter Server | 7.0 | Any | CVE-2025-41225 | 8.8 | Important | 7.0 U3v | None | None |
VMware ESXi | 8.0 | Any | CVE-2025-41226, CVE-2025-41227, CVE-2025-41228 | 6.8, 5.5, 4.3 | Moderate | ESXi80U3se-24659227 | None | None |
VMware ESXi | 7.0 | Any | CVE-2025-41226, CVE-2025-41227, CVE-2025-41228 | 6.8, 5.5, 4.3 | Moderate | ESXi70U3sv-24723868 | None | None |
VMware Cloud Foundation (vCenter) | 5.x | Any |
CVE-2025-41225, CVE-2025-41228 |
8.8, 4.3 | Important | Async patch to 8.0 U3e | None | Async Patching Guide: KB88287 |
VMware Cloud Foundation (vCenter) | 4.5.x | Any |
CVE-2025-41225 |
8.8 | Important | Async patch to 7.0 U3v | None | Async Patching Guide: KB88287 |
VMware Cloud Foundation (ESXi) | 5.x | Any |
CVE-2025-41226, CVE-2025-41227, CVE-2025-41228 |
6.8, 5.5, 4.3 | Moderate | Async patch to ESXi80U3se-24659227 | None | Async Patching Guide: KB88287 |
VMware Cloud Foundation (ESXi) | 4.5.x | Any |
CVE-2025-41226, CVE-2025-41227, CVE-2025-41228 |
6.8, 5.5, 4.3 | Moderate | Async patch to ESXi70U3sv-24723868 | None | Async Patching Guide: KB88287 |
VMware Telco Cloud Platform (ESXi) | 5.x, 4.x, 3.x, 2.x | Any |
CVE-2025-41226, CVE-2025-41227, CVE-2025-41228 |
6.8, 5.5, 4.3 | Moderate | ESXi80U3se-24659227 | None | None |
VMware Telco Cloud Infrastructure (ESXi) | 3.x | Any |
CVE-2025-41226, CVE-2025-41227, CVE-2025-41228 |
6.8, 5.5, 4.3 | Moderate | ESXi80U3se-24659227 | None | None |
VMware Telco Cloud Infrastructure (ESXi) | 2.x | Any |
CVE-2025-41226, CVE-2025-41227, CVE-2025-41228 |
6.8, 5.5, 4.3 | Moderate | ESXi70U3sv-24723868 | None | None |
VMware Telco Cloud Platform (vCenter) | 5.x, 4.x, 3.x, 2.x | Any |
CVE-2025-41225, CVE-2025-41228 |
8.8, 4.3 | Important | 8.0 U3e | None | None |
VMware Telco Cloud Infrastructure (vCenter) | 3.x | Any |
CVE-2025-41225 |
8.8 | Important | 8.0 U3e | None | None |
VMware Telco Cloud Infrastructure (vCenter) | 2.x | Any |
CVE-2025-41225 |
8.8 | Important | 7.0 U3v | None | None |
VMware Workstation | 17.x | Any |
CVE-2025-41227 |
5.5 | Moderate | 17.6.3 | None | None |
VMware Fusion | 13.x | MacOS |
CVE-2025-41227 |
5.5 | Moderate | 13.6.3 | None | None |
4. References:
Fixed Version(s) and Release Notes:
VMware vCenter Server 8.0 U3e
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5826
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/vcenter-server-update-and-patch-release-notes/vsphere-vcenter-server-80u3e-release-notes.html
VMware vCenter Server 7.0 U3v
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5849
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/vcenter-server-update-and-patch-releases/vsphere-vcenter-server-70u3v-release-notes.html
VMware ESXi 8.0 ESXi80U3se-24659227
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5825
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3e-release-notes.html
VMware ESXi 7.0 ESXi70U3sv-24723868
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5848
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3v-release-notes.html
VMware Workstation 17.6.3
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Workstation%20Pro&displayGroup=VMware%20Workstation%20Pro%2017.0%20for%20Windows&release=17.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Workstation%20Pro&displayGroup=VMware%20Workstation%20Pro%2017.0%20for%20Linux&release=17.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/workstation-pro/17-0/release-notes/vmware-workstation-1763-pro-release-notes.html
VMware Fusion 13.6.3
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Fusion&displayGroup=VMware%20Fusion%2013&release=13.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/fusion-pro/13-0/release-notes/vmware-fusion-1363-release-notes.html
KB Articles:
Cloud Foundation 5.x/4.5.x:
https://knowledge.broadcom.com/external/article?legacyId=88287
Mitre CVE Dictionary Links:
https://www.cve.org/CVERecord?id=CVE-2025-41225
https://www.cve.org/CVERecord?id=CVE-2025-41226
https://www.cve.org/CVERecord?id=CVE-2025-41227
https://www.cve.org/CVERecord?id=CVE-2025-41228
FIRST CVSSv3 Calculator:
CVE-2025-41225: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2025-41226: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H
CVE-2025-41227: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2025-41228: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
5. Change Log:
2025-05-20 VMSA-2025-0010
Initial security advisory.
6. Contact:
E-mail: [email protected]
PGP key
https://knowledge.broadcom.com/external/article/321551
VMware Security Advisories
https://www.broadcom.com/support/vmware-security-advisories
VMware External Vulnerability Response and Remediation Policy
https://www.broadcom.com/support/vmware-services/security-response
VMware Lifecycle Support Phases
https://support.broadcom.com/group/ecx/productlifecycle
VMware Security Blog
https://blogs.vmware.com/security
X
https://x.com/VMwareSRC
Copyright 2025 Broadcom. All rights reserved