Singapore’s Cyber Security Agency alerts critical VMware flaws risking code execution and data leaks.
The Cyber Security Agency of Singapore has issued an alert for multiple VMware vulnerabilities. The alert came just after Broadcom released a critical security advisory detailing multiple vulnerabilities.
These vulnerabilities, CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, and CVE-2025-41239, impact VMware ESXi, Workstation, Fusion, Tools, and related infrastructure solutions.
The four newly identified VMware vulnerabilities, listed by CSA, vary in type and severity but collectively pose a substantial risk. They can allow attackers with local administrative privileges on a virtual machine (VM) to execute arbitrary code on the host system or leak sensitive memory data.
This is an integer overflow vulnerability in the VMXNET3 virtual network adapter. A local attacker with admin privileges on a VM using this adapter could exploit the flaw to execute code directly on the host. According to Broadcom, non-VMXNET3 adapters are not affected. The vulnerability has a CVSSv3 base score of 9.3, emphasizing its potential danger.
The CVE-2025-41237 vulnerability resides in the Virtual Machine Communication Interface (VMCI) and is caused by an integer underflow. Successful exploitation could lead to code execution as the VMX process on the host. While exploitation on ESXi is confined to the VMX sandbox, Workstation and Fusion users are at greater risk, as it could result in full code execution on the host machine.
Another high-severity flaw; this heap-overflow vulnerability exists in the Paravirtualized SCSI (PVSCSI) controller. Affected configurations could allow an attacker to write out of bounds, leading to the execution of arbitrary code in the VMX process. On ESXi, the flaw is exploitable only with unsupported configurations and remains within the sandbox. However, Workstation and Fusion environments are susceptible to more severe consequences.
The CVE-2025-41239 vulnerability involves the use of uninitialized memory in vSockets, potentially allowing an attacker to leak memory from communicating processes. Although not as severe as the others, it still presents a risk, especially in sensitive or multi-tenant environments.
The vulnerabilities impact a broad spectrum of VMware’s product lineup:
The CVSSv3 base scores assigned to the vulnerabilities range from 7.1 to 9.3, classifying most as critical. There are no known workarounds, which increases the urgency for administrators to apply patches immediately.
“These are local privilege escalation vulnerabilities, but they pose a real threat in environments where users have shell access or where guest VMs might be compromised,” noted a Broadcom security engineer.
Broadcom strongly recommends all users and administrators update to the latest patched versions to mitigate these vulnerabilities in VMware. Fixed versions for each product are listed in the official response matrix and are available on Broadcom’s advisory page. For instance:
Additionally, VMware Tools for Windows 32-bit and 64-bit have been patched in versions 13.0.1.0 and 12.5.3, respectively.
These new VMware vulnerabilities, especially CVE-2025-41236 and CVE-2025-41237, highlight the critical importance of regular patching and vulnerability management. While no public exploits have yet been confirmed, the presence of proof-of-concept research and the involvement of top-tier researchers stress the need for better vulnerability management.
Given the use of VMware products in cloud, enterprise, and telco infrastructure, delaying remediation could leave systems dangerously exposed. All organizations using impacted versions should prioritize patching immediately.