Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

VMware Tools and Aria 0-Day Vulnerability Exploited for Privilege Escalation and Code Execution

Posted on September 30, 2025September 30, 2025 By CWS

A zero-day native privilege escalation vulnerability in VMware Instruments and VMware Aria Operations is being actively exploited within the wild. The flaw, tracked as CVE-2025-41244, permits an unprivileged native attacker to realize root-level code execution on affected techniques.

On September 29, 2025, Broadcom disclosed the vulnerability, which exists inside VMware’s visitor service discovery options. Nonetheless, safety agency NVISO reported figuring out zero-day exploitation of this flaw courting again to mid-October 2024 throughout incident response engagements.

The vulnerability impacts each VMware Instruments and VMware Aria Operations, key elements used for managing virtualized environments. Profitable exploitation permits a person with low privileges to execute arbitrary code inside a privileged context, corresponding to the foundation person on Linux techniques.

The flaw impacts two distinct service discovery modes:

Credential-less service discovery: On this mode, the vulnerability lies inside the VMware Instruments part itself, which is broadly deployed on visitor digital machines.

Legacy credential-based service discovery: Right here, the flaw is positioned inside VMware Aria Operations, the administration platform for hybrid-cloud workloads.

NVISO researchers confirmed the flaw exists within the open-source variant of VMware Instruments, open-vm-tools, which is distributed with most main Linux distributions.

0-Day Vulnerability Exploitation

The basis reason behind CVE-2025-41244 is an Untrusted Search Path weak point (CWE-426) within the get-versions.sh script, which is liable for figuring out the variations of providers working on a digital machine.

The script makes use of overly broad common expressions to find service binaries. For instance, a sample like /S+/httpd is designed to search out the Apache internet server binary, however may also match a file named httpd positioned in a user-writable listing like /tmp.

An attacker can exploit this by putting a malicious executable at a path like /tmp/httpd. They then run this malicious course of and have it open a listening socket. When the VMware service discovery course of runs (usually each 5 minutes), it scans for working providers.

The flawed script will discover and execute the attacker’s malicious binary with the -v flag to get its model, but it surely does so with the elevated privileges of the VMware Instruments service. This gives the attacker with a root shell, granting them full management over the system.

NVISO has attributed the in-the-wild exploitation to UNC5174, a risk actor believed to be sponsored by the Chinese language state. This group has a historical past of leveraging public exploits for preliminary entry operations.

Nonetheless, researchers famous that as a result of trivial nature of the exploit and the widespread risk actor follow of naming malware after system binaries (e.g., httpd), it’s unclear if UNC5174 exploited the flaw deliberately or unintentionally. It’s potential that different malware has been unintentionally benefiting from this privilege escalation for years.

Organizations can detect exploitation by monitoring for uncommon youngster processes spawned by vmtoolsd or the get-versions.sh script. In credential-based mode, forensic proof could also be present in lingering script information positioned in /tmp/VMware-SDMP-Scripts-{UUID}/ directories.

Broadcom has launched patches and revealed a safety advisory to deal with CVE-2025-41244, and customers are urged to use the updates instantly.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:0Day, Aria, Code, Escalation, Execution, Exploited, Privilege, Tools, VMware, Vulnerability

Post navigation

Previous Post: VMware Tools and Aria Operations Vulnerabilities Let Attackers Escalate Privileges to Root
Next Post: U.K. Police Just Seized £5.5 Billion in Bitcoin — The World’s Largest Crypto Bust

Related Posts

Threat Hunting 101 Proactive Strategies for Technical Teams Cyber Security News
FortiWeb Authentication Bypass Vulnerability Exploited Cyber Security News
New Windows-Based Airstalk Malware Employs Multi-Threaded C2 Communication to Steal Logins Cyber Security News
Global Spyware Markets to Identify New Entities Entering The Market Cyber Security News
Help TDS Weaponize Legitimate Sites’ PHP Code Templates With Fake Microsoft Windows Security Alert Pages Cyber Security News
IT Giant Ingram Micro Restores Operations Following Ransomware Attack Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark