Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
VMware Flaws That Earned Hackers 0,000 at Pwn2Own Patched

VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched

Posted on July 17, 2025July 17, 2025 By CWS

Broadcom knowledgeable prospects this week that a number of VMware product vulnerabilities disclosed earlier this yr on the Pwn2Own hacking competitors have been patched.

Contributors earned greater than $1 million on the Pwn2Own Berlin 2025 competitors organized by Development Micro’s Zero Day Initiative (ZDI). Greater than $340,000 was paid out for exploits concentrating on VMware merchandise.

The STARLabs SG workforce earned $150,000 for exploiting a single integer overflow bug to hack VMware ESXi. 

In accordance with Broadcom’s advisory, this important bug impacts the VMXNET3 digital community adapter and it may well permit an attacker with native admin privileges on a VM that makes use of the adapter to execute arbitrary code on the host. The safety gap is tracked as CVE-2025-41236.

The REverse Techniques workforce earned $112,500 for an ESXi exploit involving two bugs. The quantity is decrease than the one earned by STARLabs SG as a result of one of many flaws was identified to Broadcom. 

REverse Techniques has been credited by Broadcom for 2 CVEs: CVE-2025-41237, a important out-of-bounds write vulnerability that may be exploited by a privileged attacker on a VM to execute arbitrary code on the host, and CVE-2025-41239, a high-severity concern that permits a privileged attacker to leak reminiscence.

A researcher from Theori, an organization that was additionally represented at Pwn2Own however didn’t goal VMware, has additionally been credited for independently discovering CVE-2025-41239.

Lastly, the Synacktiv workforce earned $80,000 at Pwn2Own for a VMware Workstation exploit. Broadcom’s advisory credit Synacktiv for CVE-2025-41238, a important out-of-bounds write concern that may permit an attacker with native admin privileges on a VM to execute arbitrary code on the host. Commercial. Scroll to proceed studying.

The seller has launched patches for these vulnerabilities for VMware ESXi, Workstation, Fusion, Cloud Basis, XSphere Basis, Telco Cloud Platform, and Instruments. 

In a separate FAQ doc, Broadcom stated it has no proof that these vulnerabilities have been exploited within the wild. 

Industrial big Rockwell Automation on Wednesday additionally printed an advisory to tell prospects about these VMware vulnerabilities. A number of Rockwell merchandise which will use VMware parts are impacted, together with Industrial Knowledge Middle (IDC), VersaVirtual Equipment (VVA), Risk Detection Managed Companies (TDMS), Endpoint Safety Service, and Engineered and Built-in Options.

Associated: NATO-Flagged Vulnerability Tops Newest VMware Safety Patch Batch

Associated: Vulnerabilities Patched by Juniper, VMware and Zoom

Associated: Vulnerabilities Patched by Ivanti, VMware, Zoom

Security Week News Tags:Earned, Flaws, Hackers, Patched, Pwn2Own, VMware

Post navigation

Previous Post: Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript
Next Post: Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide

Related Posts

ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact ICS Patch Tuesday: Vulnerabilities Addressed by Siemens, Schneider, Phoenix Contact Security Week News
CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors CMMC Live: Pentagon Demands Verified Cybersecurity From Contractors Security Week News
Defakto Raises  Million for Non-Human IAM Platform Defakto Raises $30 Million for Non-Human IAM Platform Security Week News
Vulnerabilities in CISA KEV Are Not Equally Critical: Report Vulnerabilities in CISA KEV Are Not Equally Critical: Report Security Week News
Proofpoint to Acquire Hornetsecurity in Reported  Billion Deal Proofpoint to Acquire Hornetsecurity in Reported $1 Billion Deal Security Week News
Radiflow Unveils New OT Security Platform Radiflow Unveils New OT Security Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark