Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks

Posted on October 31, 2025October 31, 2025 By CWS

Oct 31, 2025Ravie LakshmananVulnerability / Cyber Assault
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Thursday added a high-severity safety flaw impacting Broadcom VMware Instruments and VMware Aria Operations to its Identified Exploited Vulnerabilities (KEV) catalog, following stories of energetic exploitation within the wild.
The vulnerability in query is CVE-2025-41244 (CVSS rating: 7.8), which may very well be exploited by an attacker to achieve root stage privileges on a prone system.
“Broadcom VMware Aria Operations and VMware Instruments comprise a privilege outlined with unsafe actions vulnerability,” CISA mentioned in an alert. “A malicious native actor with non-administrative privileges getting access to a VM with VMware Instruments put in and managed by Aria Operations with SDMP enabled could exploit this vulnerability to escalate privileges to root on the identical VM.”

The vulnerability was addressed by Broadcom-owned VMware final month, however not earlier than it was exploited as a zero-day by unknown menace actors since mid-October 2024, based on NVISO Labs. The cybersecurity firm mentioned it found the vulnerability earlier this Might throughout an incident response engagement.
The exercise is attributed to a China-linked menace actor Google Mandiant tracks as UNC5174, with NVISO Labs describing the flaw as trivial to use. Particulars surrounding the precise payload executed following the weaponization of CVE-2025-41244 have been at the moment withheld.
“When profitable, exploitation of the native privilege escalation ends in unprivileged customers attaining code execution in privileged contexts (e.g., root),” safety researcher Maxime Thiebaut mentioned. “We will, nonetheless, not assess whether or not this exploit was a part of UNC5174’s capabilities or whether or not the zero-day’s utilization was merely unintentional attributable to its trivialness.”
Additionally positioned within the KEV catalog is a essential eval injection vulnerability in XWiki that might allow any visitor person to carry out arbitrary distant code execution by the use of a specifically crafted request to the “/bin/get/Major/SolrSearch” endpoint. Earlier this week, VulnCheck revealed that it noticed makes an attempt by unknown menace actors to use the flaw and ship a cryptocurrency miner.
Federal Civilian Government Department (FCEB) businesses are required to use the required mitigations by November 20, 2025, to safe their networks towards energetic threats.

The Hacker News Tags:Active, Attacks, ChinaLinked, CISA, Exploited, Flags, Hackers, VMware, ZeroDay

Post navigation

Previous Post: Historic Great Firewall Breach – 500GB+ Censorship Data Exposed
Next Post: Japan Issues OT Security Guidance for Semiconductor Factories

Related Posts

Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization Play Ransomware Exploited Windows CVE-2025-29824 as Zero-Day to Breach U.S. Organization The Hacker News
ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure ERMAC V3.0 Banking Trojan Source Code Leak Exposes Full Malware Infrastructure The Hacker News
New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices New Sturnus Android Trojan Quietly Captures Encrypted Chats and Hijacks Devices The Hacker News
Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets Malicious npm Package nodejs-smtp Mimics Nodemailer, Targets Atomic and Exodus Wallets The Hacker News
Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown The Hacker News
Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation Microsoft Silently Patches Windows LNK Flaw After Years of Active Exploitation The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • F5 Resolves Over 50 Security Flaws in Software
  • Windows Vulnerabilities: BitLocker Bypass and CTFMON Exploit
  • Seedworm Group Exploits Signed Binaries for Cyber Attacks
  • Vulnerability in PraisonAI Exploited Within Hours
  • Langflow Vulnerability Exploited for AWS Key Theft

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark