Broadcom has released critical security updates addressing multiple high-severity vulnerabilities in VMware Aria Operations, NSX, vCenter, and VMware Tools. These flaws, if left unpatched, could allow attackers to escalate privileges, manipulate system notifications, and enumerate usernames across enterprise environments.
One of the most severe bugs, tracked as CVE-2025-41244, affects both Aria Operations and VMware Tools. Broadcom explained that a malicious local user with limited privileges could exploit this flaw to gain root access on a virtual machine running VMware Tools managed by Aria Operations with SDMP enabled. This type of escalation could give attackers full control of the affected VM.
Another high-risk issue, CVE-2025-41246, was discovered in VMware Tools for Windows. It could allow attackers to gain access to other guest VMs, posing a serious risk in shared environments. A separate medium-severity bug, CVE-2025-41245, impacts Aria Operations and may expose user credentials.
VMware also resolved a high-severity SMTP header injection vulnerability (CVE-2025-41250) in vCenter. The flaw could let authenticated users with non-admin rights manipulate notification emails tied to scheduled tasks, potentially leading to deceptive or unauthorized communications.
On the NSX side, two serious flaws have been patched.
CVE-2025-41251: a weak password recovery mechanism that makes brute-force attacks easier.
CVE-2025-41252: a username enumeration defect that could be leveraged to attempt unauthorized access.
According to Broadcom, fixes are now available in the following product versions:
Aria Operations 8.18.5
Cloud Foundation and vSphere Foundation 9.0.1.0 and 13.0.5.0
VMware Tools 13.0.5 and 12.5.4
Telco Cloud Infrastructure 8.18.5
vCenter 8.0 U3g and 7.0 U3w
NSX 4.2.2.2, 4.2.3.1, and 4.1.2.7
NSX-T 3.2.4.3
Broadcom noted that there is no evidence of active exploitation in the wild. Still, administrators are strongly urged to apply the patches immediately to reduce the risk of compromise. VMware has also published detailed patching instructions for Cloud Foundation and Telco Cloud Infrastructure customers.
These updates highlight once again how attackers continue to target virtualization platforms as a way to infiltrate enterprise networks. Organizations relying on VMware solutions should prioritize patching to stay ahead of potential threats.
Security teams say the timing of these patches is especially important given the role VMware products play in enterprise infrastructure. Virtualization platforms often sit at the center of data centers and cloud environments, meaning a single exploited flaw can provide attackers with broad lateral movement. Privilege escalation inside a hypervisor-managed environment can quickly turn a small foothold into full control over critical workloads.
Another concern is patch lag in large organizations. VMware environments are complex, and updates are sometimes delayed due to compatibility testing or operational risk. Attackers are aware of this window and often wait for patch disclosures before scanning for unpatched systems. Even without confirmed exploitation today, defenders warn that these vulnerabilities are likely to attract attention once proof-of-concept code emerges.
The flaws also reinforce a broader trend in enterprise security. Infrastructure software is increasingly targeted because it offers high leverage. Instead of breaching individual applications, attackers aim for platforms that manage identity, networking, and virtualization all at once. VMware’s footprint makes it a particularly attractive target in that strategy.
For organizations running VMware at scale, experts recommend treating this update cycle as an opportunity to review broader security posture. That includes auditing privileged access, monitoring VM-to-VM traffic, and ensuring alerting systems are hardened against manipulation. Patching closes the immediate door, but layered defenses remain essential as attackers continue to focus on the infrastructure layer.
One final takeaway is the growing importance of asset visibility. Many enterprises run older VMware components that are easy to forget until a security bulletin drops. Organizations should use this moment to inventory all VMware products in use, including Tools installed on guest VMs, which are often overlooked. Knowing exactly where vulnerable components live can dramatically cut response time and reduce exposure when critical patches like these are released.