Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability

Posted on October 1, 2025October 1, 2025 By CWS

A newly patched high-severity VMware vulnerability has been exploited as a zero-day since October 2024 for code execution with elevated privileges, NVISO Labs reviews.

Tracked as CVE-2025-41244 (CVSS rating of seven.8), the safety defect impacts each VMware Aria Operations and VMware Instruments.

VMware’s dad or mum firm Broadcom rolled out patches this week, warning that the flaw permits attackers to escalate their privileges to root on VMs which have VMware Instruments put in and are managed by Aria Operations with SDMP enabled, however made no point out of its in-the-wild exploitation.

The corporate’s public advisories usually warn clients if zero-day exploitation has been detected. 

In line with NVISO, which was credited for the discover, a Chinese language state-sponsored risk actor tracked as UNC5174 has been exploiting the bug for a 12 months. UNC5174 was lately linked to an assault on cybersecurity agency SentinelOne.  

“We are able to nonetheless not assess whether or not this exploit was a part of UNC5174’s capabilities or whether or not the zero-day’s utilization was merely unintentional resulting from its trivialness,” NVISO notes.

The vulnerability impacts VMware Aria Operations’ service and utility discovery function, which incorporates each legacy credential-based service discovery (by which VMware Instruments acts as a proxy for the operation) and credential-less service discovery (metrics assortment applied in VMware Instruments).

“As a part of its discovery, NVISO was in a position to verify the privilege escalation impacts each modes, with the logic flaw therefore being respectively situated inside VMware Aria Operations (in credential-based mode) and the VMware Instruments (in credential-less mode),” NVISO explains.Commercial. Scroll to proceed studying.

Noting that profitable exploitation of CVE-2025-41244 permits unprivileged customers to execute code with root privileges, NVISO warns that the open supply variant of VMware Instruments, specifically open-vm-tools, which is included in main Linux distributions, can also be impacted.

Open-vm-tools’ discovery operate, NVISO says, calls a operate that takes as argument an everyday expression sample that checks it to match supported service binaries.

Nevertheless, as a result of the operate makes use of the broad‑matching S character class in a number of regex patterns, it additionally matches non-system binaries situated in directories writable to non-privileged customers.

Thus, an attacker can abuse a susceptible open-vm-tools iteration by staging a malicious binary in a broadly-matched common expression path, and will probably be elevated for model discovery.

UNC5174, NVISO notes, has been exploiting the safety weak point by inserting malicious binaries within the /tmp/httpd folder. To be elevated, the binaries are executed with low privileges and open a random listening socket.

Broadcom mounted the flaw in recent releases of VMware Cloud Basis, vSphere Basis, Aria Operations, Telco Cloud Platform, and VMware Instruments, and famous that fixes for open-vm-tools might be distributed by Linux distributors.

To detect CVE-2025-41244’s exploitation, organizations ought to search for unusual little one processes. In environments with out monitoring, evaluation of lingering metrics collector scripts and outputs in legacy credential-based mode ought to verify the exploitation.

“The broad apply of mimicking system binaries (e.g., httpd) highlights the actual chance that a number of different malware strains have unintentionally been benefiting from unintended privilege escalations for years,” NVISO says, noting that the bug might simply be discovered within the open-vm-tools supply code by risk actors.

Associated: Name for Displays Open for 2025 CISO Discussion board Digital Summit

Associated: Google Patches Gemini AI Hacks Involving Poisoned Logs, Search Outcomes

Associated: Apple Updates iOS and macOS to Forestall Malicious Font Assaults

Associated: Organizations Warned of Exploited Sudo Vulnerability

Security Week News Tags:Broadcom, Disclose, Exploitation, Fails, VMware, Vulnerability, ZeroDay

Post navigation

Previous Post: Hackers Exploit Cellular Router’s API to Send Malicious SMS Messages With Weaponized Links
Next Post: Hackers Posing as Google Careers Recruiter to Steal Gmail Login Details

Related Posts

Geordie Emerges From Stealth With $6.5M for AI Agent Security Platform Security Week News
Chinese Hacking Group ‘Earth Lamia’ Targets Multiple Industries Security Week News
Apple Unveils iPhone Memory Protections to Combat Sophisticated Attacks Security Week News
Novel 5G Attack Bypasses Need for Malicious Base Station Security Week News
Undetectable Android Spyware Backfires, Leaks 62,000 User Logins Security Week News
Google Ships Android ‘Advanced Protection’ Mode to Thwart Surveillance Spyware Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News