
Cloud Vulnerability DB
A community-led vulnerabilities database
VMware Aria Operations and VMware Tools contain a local privilege escalation vulnerability identified as CVE-2025-41244, discovered and disclosed on September 29, 2025. The vulnerability affects VMware Aria Operations and VMware Tools installations, particularly in environments where Service Discovery Management Pack (SDMP) is enabled. This security flaw impacts systems with VMware Tools installed and managed by Aria Operations (VMware Advisory).
The vulnerability exists in the service discovery feature of VMware Tools, specifically within the get-versions.sh shell script's get_version function. The function uses broad-matching regular expressions that can match non-system binaries in user-writable directories, leading to untrusted search path vulnerabilities (CWE-426). The vulnerability has received a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVISO Blog, VMware Advisory).
When successfully exploited, this vulnerability allows a malicious local actor with non-administrative privileges to escalate privileges to root on the same VM. The impact is particularly severe in environments using either credential-based or credential-less service discovery modes, as it provides attackers with elevated privileges that can be used to gain complete control over the affected system (NVISO Blog).
Broadcom has released patches to address this vulnerability. Organizations should upgrade to the following fixed versions: VMware Tools 13.0.5, VMware Tools 12.5.4, VMware Aria Operations 8.18.5, or VMware Cloud Foundation Operations 9.0.1.0. For Linux systems, a patched version of open-vm-tools will be distributed through Linux vendors. No workarounds are available, making patching the only effective mitigation strategy (VMware Advisory).
The security community has expressed significant concern about this vulnerability, particularly due to its lengthy exploitation period before discovery. The ease of exploitation and its use by state-sponsored threat actors has heightened awareness about the importance of proper service discovery configuration and timely patch management in virtualized environments (NVISO Blog).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."