CybersecurityNewswireTechnology

VMware patches critical ESXi zero-day bugs exploited at Pwn2Own

▼ Summary

– VMware patched four zero-day vulnerabilities in ESXi, Workstation, Fusion, and Tools exploited during Pwn2Own Berlin 2025.
– Three flaws (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238) have a 9.3 severity rating, allowing guest VM programs to execute host commands.
– CVE-2025-41236 is an integer-overflow in VMXNET3, CVE-2025-41237 is an integer-underflow in VMCI, and CVE-2025-41238 is a heap-overflow in PVSCSI.
– The fourth flaw (CVE-2025-41239, rated 7.1) is an information disclosure issue in VMware Tools for Windows.
– VMware requires software updates to fix these flaws, with no available workarounds.

VMware has released critical security updates addressing four vulnerabilities in its virtualization products, including ESXi, Workstation, Fusion, and Tools. These flaws were originally exploited as zero-day vulnerabilities during the Pwn2Own Berlin 2025 hacking competition, highlighting their potential severity.

Three of the patched vulnerabilities carry a high-severity CVSS score of 9.3, allowing attackers with guest VM access to execute arbitrary code on the host system. Tracked as CVE-2025-41236, CVE-2025-41237, and CVE-2025-41238, these flaws stem from memory corruption issues in key VMware components.

The first vulnerability, CVE-2025-41236, involves an integer overflow in the VMXNET3 virtual network adapter, exploited by Nguyen Hoang Thach of STARLabs SG during the competition. The second, CVE-2025-41237, is an integer underflow in the VMCI (Virtual Machine Communication Interface), leading to an out-of-bounds write. Corentin BAYET of REverse Tactics successfully leveraged this flaw at Pwn2Own.

The third critical flaw, CVE-2025-41238, is a heap overflow in the PVSCSI (Paravirtualized SCSI) controller, enabling attackers with local admin privileges to execute code on the host. Researchers Thomas Bouzerar and Etienne Helluy-Lafont from Synacktiv demonstrated this exploit during the event.

Additionally, VMware patched CVE-2025-41239, rated 7.1 in severity, which allows information disclosure. Corentin BAYET also discovered this issue, chaining it with CVE-2025-41237 for a more effective attack.

No workarounds exist for these vulnerabilities, making immediate patching essential. Administrators must upgrade affected VMware products to the latest versions. Notably, CVE-2025-41239 impacts VMware Tools for Windows, requiring a separate update process.

These vulnerabilities were among 29 zero-day exploits successfully demonstrated at Pwn2Own Berlin 2025, where security researchers earned $1,078,750 in rewards. The swift patching underscores the importance of proactive vulnerability management in enterprise environments.

(Source: Bleeping Computer)

Topics

vmware security updates 100% zero-day vulnerabilities 95% pwn2own berlin 2025 90% cve-2025-41236 85% cve-2025-41237 85% cve-2025-41238 85% cve-2025-41239 80% memory corruption issues 75% virtualization products 70% enterprise vulnerability management 65%

The Wiz

Wiz Consults, home of the Internet is led by "the twins", Wajdi & Karim, experienced professionals who are passionate about helping businesses succeed in the digital world. With over 20 years of experience in the industry, they specialize in digital publishing and marketing, and have a proven track record of delivering results for their clients.