Tech »  Topic »  VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution

VMware ESXi and Workstation Vulnerabilities Allow Host-Level Code Execution


Broadcom disclosed four critical vulnerabilities in VMware’s virtualization suite on July 15, 2025, enabling attackers to escape virtual machines and execute code directly on host systems.

The flaws, discovered through the Pwn2Own competition, affect ESXi, Workstation, Fusion, and VMware Tools across enterprise and desktop environments.

Vulnerability Overview

CVE ID Component Vulnerability Type CVSS Score Impact
CVE-2025-41236 VMXNET3 Virtual NIC Integer Overflow 9.3 Host-level code execution
CVE-2025-41237 VMCI Integer Underflow 9.3 VMX process compromise
CVE-2025-41238 PVSCSI Controller Heap Overflow 9.3 Host-level code execution
CVE-2025-41239 vSockets Information Disclosure 7.1 Memory leak

The most severe vulnerability, CVE-2025-41236, resides in the VMXNET3 virtual network adapter.

Attackers with administrative privileges inside a guest virtual machine can trigger an integer overflow that allows arbitrary code execution on the underlying host system.

This flaw affects VMware’s most commonly deployed virtual network adapter, making it particularly dangerous for cloud and enterprise environments ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE