Broadcom Addresses VMware Zero-Day Vulnerability CVE-2025-41244

Broadcom VMware CVE-2025-41244 vulnerability UNC5174 patches security
Edward Zhou
Edward Zhou

CEO & Co-Founder

 
October 2, 2025 3 min read

Broadcom Patches VMware Zero-Day Exploited by UNC5174

Broadcom has released patches for six VMware vulnerabilities, including CVE-2025-41244, which has been actively exploited in the wild by the threat actor known as UNC5174 since mid-October 2024. This local privilege escalation vulnerability affects VMware Aria Operations and VMware Tools.

Chinese hackers espionage
Image courtesy of Security Affairs

According to Broadcom's advisory, “A malicious local actor with non-administrative privileges having access to a VM with VMware Tools installed and managed by Aria Operations with SDMP enabled may exploit this vulnerability to escalate privileges to root on the same VM.” The maximum CVSSv3 base score for this vulnerability is 7.8 source.

The vulnerability impacts several versions of VMware products, including:

  • VMware Cloud Foundation 4.x and 5.x
  • VMware Cloud Foundation 9.x.x.x
  • VMware Aria Operations 8.x
  • VMware Tools 11.x.x, 12.x.x, and 13.x.x (Windows, Linux)

Furthermore, Broadcom has also addressed an Information disclosure vulnerability (CVE-2025-41245) and an improper authorization vulnerability (CVE-2025-41246) in VMware products. Patches for these vulnerabilities are available for Aria Ops, Tools, Cloud, and Telco.

Details of CVE-2025-41244

CVE-2025-41244 allows a malicious actor to escalate privileges to root within a VM if they can access it with non-administrative privileges. The vulnerability has been continuously exploited since its identification by NVISO Labs in mid-October 2024.

The underlying issue affects both credential-based and credential-less service discovery modes in VMware Aria Operations. The NVISO report confirms that UNC5174 triggered the local privilege escalation.

Impacted Products

  • VMware Aria Operations
  • VMware Tools
  • VMware Cloud Foundation
  • VMware Telco Cloud Platform
  • VMware Telco Cloud Infrastructure

Known Attack Vectors

A local actor can exploit this vulnerability by having access to a VM with VMware Tools installed and managed by Aria Operations.

Resolution

To remediate CVE-2025-41244, users are advised to apply the patches listed in the advisory here.

Technical Analysis of the Vulnerability

The vulnerability manifests in the service discovery feature of VMware Tools, specifically through the execution of the get-versions.sh shell script. This script can be abused by unprivileged users if they can place a malicious binary in a writable directory such as /tmp.

The following excerpt outlines the logic flaw:

get_version() {
  PATTERN=$1
  VERSION_OPTION=$2
  for p in $space_separated_pids
  do
    COMMAND=$(get_command_line $p | grep -Eo "$PATTERN")
    [ ! -z "$COMMAND" ] && echo VERSIONSTART "$p" "$("${COMMAND%%[[:space:]]*}" $VERSION_OPTION 2>&1)" VERSIONEND
  done
}

This function fails to restrict execution to only system binaries, allowing an unprivileged user to escalate their privileges by executing a malicious binary disguised as a legitimate process.

Proof of Concept

An unprivileged local attacker can create a malicious binary in a directory writable to them. For example, the following Go code demonstrates the privilege escalation:

package main
// Code omitted for brevity

Once compiled and executed, this code would allow the attacker to spawn an elevated root shell when the VMware metrics collection is executed.

Additional Vulnerabilities Addressed

Broadcom has also patched the following vulnerabilities:

  • CVE-2025-41245: An information disclosure vulnerability in VMware Aria Operations with a CVSSv3 base score of 4.9.
  • CVE-2025-41246: An improper authorization vulnerability in VMware Tools for Windows, rated with a CVSSv3 base score of 7.6.

For further details, refer to the Broadcom Support Portal.

References for Further Reading

Edward Zhou
Edward Zhou

CEO & Co-Founder

 

CEO & Co-Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions.

Related News

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends
React2Shell vulnerability

React2Shell Vulnerability CVE-2025-55182: Exploitation Threats and Trends

Critical React2Shell RCE vulnerability exploited by threat actors. Learn about attacker techniques, observed payloads like crypto miners, and how to protect your systems. Read now!

By Divyansh Ingle December 12, 2025 8 min read
Read full article
WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups
WinRAR vulnerability

WinRAR CVE-2025-6218 Vulnerability Under Active Attack by Threat Groups

CISA flags WinRAR CVE-2025-6218 as actively exploited. Learn about this path traversal flaw and how to protect your systems. Update now!

By Jim Gagnard December 11, 2025 3 min read
Read full article
Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers
malicious VSCode extensions

Malicious VSCode Extensions Launch Multi-Stage Attacks and Infostealers

Beware of malicious VSCode extensions & device code phishing scams. Learn how these attacks steal credentials, capture screens, and hijack sessions. Protect yourself now!

By Alan V Gutnov December 10, 2025 6 min read
Read full article
PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure
BRICKSTORM malware

PRC State-Sponsored BRICKSTORM Malware Targets Critical Infrastructure

Discover how PRC state actors are using BRICKSTORM malware to gain persistent access via VMware. Learn about its advanced evasion techniques and how to defend your systems. Read now!

By Divyansh Ingle December 9, 2025 3 min read
Read full article