CVE-2025-41238

VMware · VMware Multiple Products

A critical heap-overflow vulnerability has been identified in multiple VMware products, including ESXi, Workstation, and Fusion.

Executive summary

A critical heap-overflow vulnerability has been identified in multiple VMware products, including ESXi, Workstation, and Fusion. An attacker with administrative access to a guest virtual machine could exploit this flaw to execute malicious code on the underlying host system, resulting in a full system compromise. This "VM escape" scenario poses a severe risk to data confidentiality, integrity, and availability for all virtual machines running on the affected host.

Vulnerability

The vulnerability is a heap-overflow within the Paravirtualized SCSI (PVSCSI) controller component. An attacker who has already gained local administrative privileges on a guest virtual machine can send specially crafted SCSI commands to the PVSCSI device. This action triggers a heap-overflow condition, leading to an out-of-bounds memory write on the host system, which can be leveraged to achieve arbitrary code execution in the context of the hypervisor process.

Business impact

This vulnerability is rated as Critical with a CVSS score of 9.3. A successful exploit would allow an attacker to break out of the guest virtual machine's isolated environment and gain control over the host hypervisor. This could lead to severe consequences, including the compromise of all other virtual machines on the host, unauthorized access to or exfiltration of sensitive data from any guest, deployment of ransomware across the virtualized infrastructure, and using the compromised host as a pivot point to attack the broader corporate network. The potential for complete loss of control over a virtualization host presents an extreme risk to business operations.

Remediation

Immediate Action: Apply the security patches released by VMware immediately. Prioritize patching for internet-facing systems, multi-tenant environments, and hosts running critical business applications. After patching, it is crucial to monitor for any signs of exploitation attempts and review system and access logs for anomalous activity preceding the patching window.

Proactive Monitoring: Security teams should monitor for unusual activity on virtualization hosts, such as unexpected process creation, anomalous network connections originating from the hypervisor, or crashes related to the VM process. Within guest systems, monitor for suspicious administrative activities or the presence of known exploit tools. Review hypervisor logs for errors or warnings related to the PVSCSI controller or memory management failures.

Compensating Controls: If immediate patching is not possible, consider changing the virtual machine's SCSI controller from the vulnerable "VMware Paravirtual" (PVSCSI) to another type, such as "LSI Logic SAS," if performance and guest OS compatibility permit. Additionally, implementing strict network segmentation for hypervisor management interfaces and hardening guest operating systems to prevent initial administrative compromise can help reduce the overall risk.

Exploitation status

Public Exploit Available: false

Analyst recommendation

Due to the critical severity (CVSS 9.3) and the potential for a complete host system compromise, we strongly recommend that organizations prioritize the immediate application of vendor-supplied patches to all affected VMware products. This vulnerability represents a significant threat to the security of your virtualized environment. While it is not yet known to be exploited, its high impact makes it a prime target for future attacks. If patching cannot be performed immediately, implement the suggested compensating controls to mitigate the risk until patches can be deployed.