Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical VMware Tools VGAuth Vulnerabilities Enable Full System Access for Attackers

Posted on July 25, 2025July 25, 2025 By CWS

Two important vulnerabilities within the VMware Visitor Authentication Service (VGAuth) part of VMware Instruments permit native attackers to escalate privileges from any person account to SYSTEM-level entry on Home windows digital machines. 

The vulnerabilities, tracked as CVE-2025-22230 and CVE-2025-22247, have an effect on VMware Instruments installations throughout ESXi-managed environments and standalone VMware Workstation deployments.

Key Takeaways1.  VMware Instruments VGAuth lets native customers turn into SYSTEM on Home windows VMs2. Named pipe hijacking and path traversal allow privilege escalation.3. Replace to VMware Instruments 12.5.1+ now

Authentication Bypass Vulnerability

The primary vulnerability, CVE-2025-22230, stems from a important flaw in VGAuth’s named pipe implementation that allows authentication bypass by way of a pre-creation assault. 

PT SWARM experiences that the VGAuth service creates user-specific personal pipes utilizing predictable naming conventions (.pipevgauth-service-) with out the FILE_FLAG_FIRST_PIPE_INSTANCE flag, permitting low-privileged attackers to create malicious pipes earlier than the service does.

Safety researcher Sergey Bliznyuk demonstrated how attackers can exploit this by making a named pipe at .pipevgauth-service-system with permissive entry controls. 

When the service makes an attempt to create the pipe for SYSTEM authentication, it unknowingly makes use of the attacker-controlled pipe, successfully granting superuser privileges inside the VGAuth protocol. 

As soon as authenticated as SYSTEM, attackers achieve entry to certificates alias shops, ticket validation mechanisms, and SAML authentication tokens for privilege escalation.

Path Traversal Vulnerability

The second vulnerability, CVE-2025-22247, exploits inadequate enter validation within the alias retailer administration features. 

The QueryAliases and RemoveAlias operations settle for unsanitized username parameters, enabling path traversal assaults utilizing sequences like “../../../../../../evil” to interrupt out of the meant C:ProgramDataVMwareVMware VGAuthaliasStore listing.

Attackers can leverage symbolic hyperlink manipulation and time-of-check/time-of-use (TOCTOU) assaults to realize arbitrary file deletion and write operations. 

By combining junction mount factors with DOS gadget symlinks, and using Opportunistic Locks for exact timing, attackers can redirect file operations to privileged system areas reminiscent of C:WindowsSystem32, enabling DLL hijacking for SYSTEM-level code execution.

CVETitleCVSS 3.1 ScoreSeverityAffected VersionPatched VersionCVE-2025-22230Authentication bypass by way of named pipe hijacking7.8HighVMware Instruments 12.5.0VMware Instruments 12.5.1CVE-2025-22247Path traversal and insecure hyperlink resolution6.1MediumVMware Instruments 12.5.0VMware Instruments 12.5.2

Patches Launched 

Broadcom has addressed each vulnerabilities by way of coordinated safety updates following accountable disclosure in early 2025. 

CVE-2025-22230 was patched in VMware Instruments 12.5.1 launched on March 25, 2025, implementing randomized personal pipe names with UUID suffixes and implementing the FILE_FLAG_FIRST_PIPE_INSTANCE flag to forestall hijacking assaults.

CVE-2025-22247 obtained remediation in VMware Instruments 12.5.2 on Could 12, 2025, introducing enter validation to reject usernames containing unsafe path traversal characters, runtime path validation utilizing GetFinalPathNameByHandleW, and a brand new allowSymlinks configuration flag defaulting to false. 

Organizations operating VMware Instruments in Home windows visitor environments ought to instantly improve to the newest model to mitigate these important safety dangers.

Expertise sooner, extra correct phishing detection and enhanced safety for your small business with real-time sandbox analysis-> Strive ANY.RUN now

Cyber Security News Tags:Access, Attackers, Critical, Enable, Full, System, Tools, VGAuth, VMware, Vulnerabilities

Post navigation

Previous Post: Cyber Espionage Campaign Hits Russian Aerospace Sector Using EAGLET Backdoor
Next Post: In Other News: $30k Google Cloud Build Flaw, Louis Vuitton Breach Update, Attack Surface Growth

Related Posts

AMD Warns of Transient Scheduler Attacks Affecting Wide Range of Chipsets Cyber Security News
Threat Actors Using Fake Travel Websites to Infect Users’ PCs with XWorm Malware Cyber Security News
Weaponized LNK File Disguised as Credit Card Security Email Steals User Data Cyber Security News
Zoom Clients for Windows Vulnerability Exposes Users to DoS Attacks Cyber Security News
New TokenBreak Attack Bypasses AI Model’s with Just a Single Character Change Cyber Security News
Threat Actors Weaponizing Facebook Ads to Deliver Malware and Stealing Wallet Passwords Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • How to Report Cyberbullying
  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Infamous BreachForums Is Back Online With All Accounts and Posts Restored

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • How to Report Cyberbullying
  • 15 Best Docker Monitoring Tools in 2025
  • 20 Best SNMP Monitoring Tools in 2025
  • Hackers Compromised Official Gaming Mouse Software to Deliver Windows-based Xred Malware
  • Infamous BreachForums Is Back Online With All Accounts and Posts Restored

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News