Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched

Posted on July 17, 2025July 17, 2025 By CWS

Broadcom knowledgeable prospects this week that a number of VMware product vulnerabilities disclosed earlier this yr on the Pwn2Own hacking competitors have been patched.

Contributors earned greater than $1 million on the Pwn2Own Berlin 2025 competitors organized by Development Micro’s Zero Day Initiative (ZDI). Greater than $340,000 was paid out for exploits concentrating on VMware merchandise.

The STARLabs SG workforce earned $150,000 for exploiting a single integer overflow bug to hack VMware ESXi. 

In accordance with Broadcom’s advisory, this important bug impacts the VMXNET3 digital community adapter and it may well permit an attacker with native admin privileges on a VM that makes use of the adapter to execute arbitrary code on the host. The safety gap is tracked as CVE-2025-41236.

The REverse Techniques workforce earned $112,500 for an ESXi exploit involving two bugs. The quantity is decrease than the one earned by STARLabs SG as a result of one of many flaws was identified to Broadcom. 

REverse Techniques has been credited by Broadcom for 2 CVEs: CVE-2025-41237, a important out-of-bounds write vulnerability that may be exploited by a privileged attacker on a VM to execute arbitrary code on the host, and CVE-2025-41239, a high-severity concern that permits a privileged attacker to leak reminiscence.

A researcher from Theori, an organization that was additionally represented at Pwn2Own however didn’t goal VMware, has additionally been credited for independently discovering CVE-2025-41239.

Lastly, the Synacktiv workforce earned $80,000 at Pwn2Own for a VMware Workstation exploit. Broadcom’s advisory credit Synacktiv for CVE-2025-41238, a important out-of-bounds write concern that may permit an attacker with native admin privileges on a VM to execute arbitrary code on the host. Commercial. Scroll to proceed studying.

The seller has launched patches for these vulnerabilities for VMware ESXi, Workstation, Fusion, Cloud Basis, XSphere Basis, Telco Cloud Platform, and Instruments. 

In a separate FAQ doc, Broadcom stated it has no proof that these vulnerabilities have been exploited within the wild. 

Industrial big Rockwell Automation on Wednesday additionally printed an advisory to tell prospects about these VMware vulnerabilities. A number of Rockwell merchandise which will use VMware parts are impacted, together with Industrial Knowledge Middle (IDC), VersaVirtual Equipment (VVA), Risk Detection Managed Companies (TDMS), Endpoint Safety Service, and Engineered and Built-in Options.

Associated: NATO-Flagged Vulnerability Tops Newest VMware Safety Patch Batch

Associated: Vulnerabilities Patched by Juniper, VMware and Zoom

Associated: Vulnerabilities Patched by Ivanti, VMware, Zoom

Security Week News Tags:Earned, Flaws, Hackers, Patched, Pwn2Own, VMware

Post navigation

Previous Post: Threat Actors Weaponizing SVG Files to Embed Malicious JavaScript
Next Post: Europol Disrupted “NoName057(16)” Hacking Group’s Infrastructure of 100+ Servers Worldwide

Related Posts

Russian Hackers Bypass Gmail MFA with App Specific Password Ruse Security Week News
Train Hack Gets Proper Attention After 20 Years: Researcher  Security Week News
Dozens of SysAid Instances Vulnerable to Remote Hacking Security Week News
Cybersecurity M&A Roundup: 42 Deals Announced in May 2025 Security Week News
Qantas Hit with Extortion Demand After Data Breach Security Week News
The Wild Wild West of Agentic AI – An Attack Surface CISOs Can’t Afford to Ignore Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • H2Miner Attacking Linux, Windows, and Containers to Mine Monero
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Ukraine Hackers Claimed Cyberattack on Major Russian Drone Supplier
  • Researchers Uncover on How Hacktivist Groups Gaining Attention and Selecting Targets
  • Hackers Use GitHub Repositories to Host Amadey Malware and Data Stealers, Bypassing Filters
  • H2Miner Attacking Linux, Windows, and Containers to Mine Monero
  • Hackers Exploiting Blind Spots in DNS Records to Store and Deliver Malware

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News