Source: BleepingComputer Author: Sergiu Gatlan URL: https://www.bleepingcomputer.com/news/security/broadcom-warns-of-authentication-bypass-in-vmware-windows-tools/
ONE SENTENCE SUMMARY:
Broadcom patched a high-severity authentication bypass in VMware Tools for Windows, preventing local attackers from gaining high privileges on VMs.
MAIN POINTS:
- Broadcom fixed CVE-2025-22230, an authentication bypass vulnerability in VMware Tools for Windows.
- The flaw stems from improper access control and allows privilege escalation on virtual machines.
- Local attackers with low privileges can exploit it without user interaction.
- The vulnerability was reported by Sergey Bliznyuk from Positive Technologies.
- Broadcom recently patched three VMware zero-days exploited in attacks (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226).
- Attackers can chain these zero-days to escape virtual machine sandboxes.
- Over 37,000 internet-exposed VMware ESXi instances were found vulnerable to CVE-2025-22224.
- Ransomware gangs and state-sponsored hackers frequently exploit VMware vulnerabilities.
- Broadcom previously warned of VMware vCenter Server vulnerabilities exploited in real-world attacks.
- Chinese state hackers used a VMware zero-day since 2021 to deploy backdoors on ESXi systems.
TAKEAWAYS:
- VMware Tools for Windows had a high-severity vulnerability allowing local privilege escalation.
- Broadcom quickly patched multiple VMware security flaws, some actively exploited.
- VMware vulnerabilities are frequent targets for ransomware groups and nation-state hackers.
- Thousands of VMware ESXi instances remain vulnerable to recently patched flaws.
- Continuous patching and monitoring are essential to securing VMware environments from exploitation.