Update VMware Tools for Windows NOW: High-Severity Flaw Lets Hackers Bypass Authentication

Date:

Share:


Image: Ferran Rodenas/Flickr/Creative Commons

If you use VMware Tools for Windows, it is critical to update to the latest version. Broadcom, which acquired VMware for $69 billion in 2023, has issued a patch for a high-severity vulnerability that is actively being exploited by cybercriminals.

The vulnerability affects VMware Tools for Windows versions 11.x.x and 12.x.x, but has been patched in version 12.5.1. Broadcom confirmed that no workarounds are available, so affected users should update immediately.

What are the details about this authentication bypass vulnerability?

VMware Tools for Windows is a suite of utilities that enhances the performance and functionality of Windows-based virtual machines running on VMware platforms. It supports functions like display resolution, seamless mouse and keyboard integration, and better time synchronization between host and guest systems.

CVE-2025-22230 is classified as an “authentication bypass vulnerability,” according to Broadcom’s security advisory. While technical details remain limited, Broadcom suggests that the flaw results from improper access control mechanisms in some versions of VMware Tools for Windows.

“A malicious actor with non-administrative privileges on a Windows guest (virtual machine) may gain (the) ability to perform certain high-privilege operations within that VM,” the company said.

The vulnerability has a CVSS score of 7.8 out of 10, indicating a high-severity issue. It does not require user interaction for exploitation.

The vulnerability was reported by Sergey Bliznyuk of Positive Technologies, a Russian cybersecurity firm sanctioned by the U.S. Treasury in 2021 for allegedly providing security tools to and hosting recruitment events for Russian intelligence services.

VMware vulnerabilities are oft-targeted

Earlier this month, Broadcom patched three actively exploited zero-day vulnerabilities in VMware ESXi, Workstation, and Fusion. These required attackers to have administrator or root access to a virtual machine, but if they did, they could escape its sandbox and breach the underlying hypervisor, potentially exposing all connected virtual machines and sensitive data. At the time, nearly 41,500 VMWare ESXi instances were identified as vulnerable due to CVE-2025-22224.

Last year, VMware ESXi servers were hit by a double-extortion ransomware variant, with the threat actors impersonating a real organization. Hackers like to target VMware as it is widely used in enterprise. Furthermore, compromising the hypervisor can allow attackers to disable multiple virtual machines simultaneously and remove recovery options such as snapshots or backups, ensuring a significant impact on a business’s operations.



Source link

━ more like this

Why London Companies Should Outsource Their Payroll

Running a business in London means operating in one of the most competitive, fast-paced, and regulated environments in the world. Every decision —...

Digital Kazakhstan: Now banking operations in the Freedom Bank app are performed by AI – London Business News | Londonlovesbusiness.com

Freedom Bank in Kazakhstan has implemented Artificial Intelligence (AI) into its business services. Within its super app, the bank has launched a voice-based...

Pick up a four-pack of AirTags on sale for only $65

Even if you missed Amazon's fall edition of Prime Day earlier this month, you can still get some great deals on popular products...

Tech Reader Podcast: How to survive our AI video hellscape

The era of AI video is upon us, and honestly it's kind of terrifying. Between OpenAI's Sora and official communications from the Trump...

Why NEBOSH courses are essential for UK site managers – London Business News | Londonlovesbusiness.com

Health and safety are at the heart of every successful construction project. For site managers, the responsibility of keeping workers safe and ensuring...
spot_img