- December 2, 2025
- Posted by: Chernor Jalloh
- Categories:
THREAT SUMMARY
Broadcom has released security updates for VMware Aria Operations and VMware Tools to address multiple vulnerabilities that could enable local privilege escalation, information disclosure, and improper authorization bypass. Exploitation may allow attackers to gain elevated privileges or access sensitive information in affected VMware
environments.
IMPACTED PRODUCTS
• VMware Aria Operations
• VMware Tools
• VMware Cloud Foundation
• VMware Telco Cloud Platform
• VMware Telco Cloud Infrastructure
VULNERABILITIES
1. Local Privilege Escalation (CVE-2025-41244)
• CVSSv3 Score: 7.8 (High)
• Impact: Allows a malicious local user with non-admin rights on a VM running VMware Tools managed by Aria Operations to escalate privileges to root.
• Workarounds: None
• Fix Available: Yes
2. Information Disclosure (CVE-2025-41245)
• CVSSv3 Score: 4.9 (Moderate)
• Impact: Non-administrative users in Aria Operations could disclose credentials of other users.
• Workarounds: None
• Fix Available: Yes
3. Improper Authorization (CVE-2025-41246)
• CVSSv3 Score: 7.6 (High)
• Impact: In VMware Tools for Windows, authenticated non-admin users may leverage improper access controls to reach other guest VMs, provided they possess credentials of target VMs and vCenter/ESX.
• Workarounds: None
• Fix Available: Yes
RESOLUTION / FIXED VERSIONS
Patches are available for all impacted products. Administrators are strongly advised to upgrade to the following secure versions:
• VMware Aria Operations: 8.18.5
• VMware Tools (Windows/Linux): 13.0.5 / 12.5.4
• VMware Cloud Foundation Operations: 9.0.1.0
• VMware Telco Cloud Platform & Infrastructure: Apply version 8.18.5 or referenced KBs
MITIGATION
• No workarounds are available. Immediate patching is required.
• Monitor for unusual privilege escalation attempts and unauthorized access to credentials.
• Validate that VMware Tools across environments are updated consistently.
REFERENCES
• Broadcom VMSA-2025-0015 Advisory
• SL-CSIRT
Action Required: Organizations running affected VMware products should apply the patches immediately to mitigate the risk of privilege escalation and unauthorized access within virtual environments.