VMware Security Advisory: VMSA-2025-0013 – Critical Vulnerabilities in VMware Products

Affected Products:

  • VMware Cloud Foundation
  • VMware vSphere Foundation
  • VMware ESXi
  • VMware Workstation Pro
  • VMware Fusion
  • VMware Tools
  • VMware Telco Cloud Platform
  • VMware Telco Cloud Infrastructure

Introduction

VMware Security Team has released VMSA-2025-0013, addressing several critical vulnerabilities across a range of VMware products. These vulnerabilities could potentially lead to code execution, information disclosure, or other severe security risks if left unpatched. The vulnerabilities were privately reported and patches are now available to remediate the issues.

Vulnerabilities Overview

The vulnerabilities identified in the advisory affect VMware ESXi, Workstation, Fusion, and VMware Tools. The key vulnerabilities include:

  1. VMXNET3 Integer-Overflow Vulnerability (CVE-2025-41236)
  2. VMCI Integer-Underflow Vulnerability (CVE-2025-41237)
  3. PVSCSI Heap-Overflow Vulnerability (CVE-2025-41238)
  4. vSockets Information Disclosure Vulnerability (CVE-2025-41239)

Each of these vulnerabilities carries a CVSSv3 base score between 6.2 and 9.3, indicating critical security risks.

Detailed Descriptions of the Vulnerabilities

1. VMXNET3 Integer-Overflow Vulnerability (CVE-2025-41236)

Severity: Critical
CVSSv3 Score: 9.3
Description:
An integer-overflow vulnerability in the VMXNET3 virtual network adapter could allow a local administrative attacker to execute code on the host. This vulnerability only affects virtual machines using the VMXNET3 adapter, and other network adapters are unaffected.
Resolution: Apply patches for CVE-2025-41236 as listed in the Response Matrix.
Workarounds: None
Further Documentation

2. VMCI Integer-Underflow Vulnerability (CVE-2025-41237)

Severity: Critical
CVSSv3 Score: 9.3
Description:
This issue exists within the Virtual Machine Communication Interface (VMCI), leading to an out-of-bounds write. It allows a local attacker to execute code on the virtual machine’s VMX process. On ESXi, the issue is confined within the VMX sandbox, whereas on Workstation and Fusion, exploitation could lead to code execution on the host machine.
Resolution: Apply patches for CVE-2025-41237.
Workarounds: None
Further Documentation

3. PVSCSI Heap-Overflow Vulnerability (CVE-2025-41238)

Severity: Critical
CVSSv3 Score: 9.3
Description:
A heap-overflow vulnerability in the PVSCSI controller in ESXi, Workstation, and Fusion could allow a malicious actor to execute code on the host system. In ESXi, exploitation is possible only under unsupported configurations.
Resolution: Apply patches for CVE-2025-41238.
Workarounds: None
Further Documentation

4. vSockets Information Disclosure Vulnerability (CVE-2025-41239)

Severity: Important
CVSSv3 Score: 7.1
Description:
An information disclosure vulnerability caused by uninitialized memory usage in vSockets could leak sensitive memory content. This could be exploited by an attacker with local administrative privileges to disclose memory from processes using vSockets.
Resolution: Apply patches for CVE-2025-41239.
Workarounds: None
Further Documentation
Note: VMware Tools for Windows is also impacted by CVE-2025-41239.

Patch Details and Affected Versions

The following products are affected, with patches available for remediation:

  • VMware Cloud Foundation
    Affected Versions: 4.5.x, 5.x
    Fixed Version: ESXi80U3f-24784735
    Documentation: Async Patching Guide
  • VMware ESXi
    Affected Versions: 7.0, 8.0
    Fixed Versions: ESXi80U3f-24784735, ESXi70U3w-24784741
    Documentation: Release Notes
  • VMware Workstation
    Version: 17.x
    Fixed Version: 17.6.4
    Documentation: Release Notes
  • VMware Fusion
    Version: 13.x
    Fixed Version: 13.6.4
    Documentation: Release Notes
  • VMware Tools
    Affected Versions: 11.x.x, 12.x.x, 13.x.x (Windows)
    Fixed Version: 13.0.1
    Documentation: Release Notes

Conclusion

These vulnerabilities, if exploited, could lead to severe security risks, including potential code execution on VMware ESXi, Workstation, Fusion, and Tools. It is highly recommended that organizations apply the necessary patches as soon as possible to mitigate these risks. For additional information, please refer to the documentation and FAQs linked above.

Ensure your VMware environments are up to date and secure by regularly checking for and applying patches.

Stay secure, stay updated!

Subscribe to the channel: youtube.be/@AngryAdmin 🔥

🚨Dive into my blog: angrysysops.com

🚨Snapshots 101: a.co/d/fJVHo5v

🌐Connect with us:

💻Website: angrysysops.com

🔥vExpert info: vExpert Portal

Please leave the comment