Broadcom Releases Security Updates for VMware vCenter Server and Cloud Foundation Vulnerabilities
Advisory addresses two critical vulnerabilities that could lead to arbitrary code execution and allow unauthorised access to internal VMware Cloud Foundation services
Summary
Advisory addresses two critical vulnerabilities that could lead to arbitrary code execution and allow unauthorised access to internal VMware Cloud Foundation services
Affected platforms
The following platforms are known to be affected:
Threat details
Introduction
Broadcom has released two security advisories that addresses multiple vulnerabilities in VMware ESXi, VMware vCenter Server, VMware Cloud Foundation, VMware Workstation and Fusion and VMware Telco Cloud.
Broadcom has released software updates to address multiple security vulnerabilities, including the two detailed below.
Vulnerability Details
- CVE-2025-41225 is an 'authenticated command-execution' vulnerability in vCenter Server with a CVSSv3 score of 8.8. An attacker with privileges to create/modify alarms and configure script actions could perform arbitrary code execution (ACE) on the vCenter Server.
- CVE-2025-41229 is a 'directory traversal' vulnerability in VMware Cloud Foundation with a CVSSv3 score of 8.2. An attacker with network access to port 443 could gain access to certain internal services within VMware Cloud Foundation.
Remediation advice
Affected organisations are encouraged to review Broadcom's VMware advisories and apply the relevant updates as soon as practicable. These advisories are detailed below for clarity.
Remediation steps
Type | Step |
---|---|
Patch |
CVE-2025-41225 | VMware Cloud Foundation https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25717 |
Patch |
CVE-2025-41229 | VMware vCenter Server https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25733 |
Definitive source of threat updates
CVE Vulnerabilities
Last edited: 21 May 2025 12:38 pm