Skip to main content

Broadcom Releases Security Updates for VMware vCenter Server and Cloud Foundation Vulnerabilities

Advisory addresses two critical vulnerabilities that could lead to arbitrary code execution and allow unauthorised access to internal VMware Cloud Foundation services

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Advisory addresses two critical vulnerabilities that could lead to arbitrary code execution and allow unauthorised access to internal VMware Cloud Foundation services


Threat details

Introduction

Broadcom has released two security advisories that addresses multiple vulnerabilities in VMware ESXi, VMware vCenter Server, VMware Cloud Foundation, VMware Workstation and Fusion and VMware Telco Cloud. 

Broadcom has released software updates to address multiple security vulnerabilities, including the two detailed below.


Vulnerability Details

  • CVE-2025-41225 is an 'authenticated command-execution' vulnerability in vCenter Server with a CVSSv3 score of 8.8. An attacker with privileges to create/modify alarms and configure script actions could perform arbitrary code execution (ACE) on the vCenter Server. 
  • CVE-2025-41229 is a 'directory traversal' vulnerability in VMware Cloud Foundation with a CVSSv3 score of 8.2. An attacker with network access to port 443 could gain access to certain internal services within VMware Cloud Foundation. 

Remediation advice

Affected organisations are encouraged to review Broadcom's VMware advisories and apply the relevant updates as soon as practicable. These advisories are detailed below for clarity.




CVE Vulnerabilities

Last edited: 21 May 2025 12:38 pm