HomeVulnerabilityBroadcom fixes high-severity VMware NSX bugs reported by NSA

Broadcom fixes high-severity VMware NSX bugs reported by NSA

Broadcom has launched security updates to patch two high-severity VMware NSX vulnerabilities reported by the U.S. Nationwide Safety Company (NSA).

VMware NSX is a networking virtualization resolution inside VMware Cloud Basis that allows directors to deploy conventional and trendy purposes in personal/hybrid clouds.

The primary security flaw reported by the NSA, tracked as CVE-2025-41251, is because of a weak point within the password restoration mechanism that may let unauthenticated attackers enumerate legitimate usernames, which may later be utilized in brute-force assaults.

The second (CVE-2025-41252) is a username enumeration vulnerability that unauthenticated menace actors may also exploit to enumerate legitimate usernames, which may probably result in unauthorized entry makes an attempt.

“Broadcom want to thank the Nationwide Safety Company for reporting this problem to us,” the corporate mentioned in a Monday security advisory.

Yesterday, the corporate patched a high-severity SMTP header injection vulnerability (CVE-2025-41250) in VMware vCenter that may let attackers with non-administrative privileges and permission to create scheduled duties to govern the notification emails despatched for scheduled duties.

See also  ASUS warns of vital auth bypass flaw in routers utilizing AiCloud

As a part of a second security advisory, Broadcom disclosed three extra security flaws in VMware Aria Operations and VMware Instruments (CVE-2025-41244, CVE-2025-41245, CVE-2025-41246) that may be exploited to escalate privileges to root, steal different customers’ credentials, and entry different visitor VMs.

Earlier this yr, Broadcom additionally patched 4 vulnerabilities in VMware ESXi, Workstation, Fusion, and Instruments that had been disclosed and exploited as zero-days through the Pwn2Own Berlin 2025 hacking contest in Might 2025, after fixing three actively exploited VMware zero days (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) reported by the Microsoft Risk Intelligence Heart.

State-sponsored hackers and cybercrime gangs, together with ransomware operations, regularly goal VMware vulnerabilities, on condition that enterprises extensively use VMware merchandise to switch and retailer delicate company knowledge.

For example, in November, attackers started exploiting two VMware vCenter Server flaws, a privilege escalation to root (CVE-2024-38813) and a vital distant code execution flaw (CVE-2024-38812), which had been disclosed throughout China’s 2024 Matrix Cup hacking contest.

See also  Cisco Points Pressing Repair for Authentication Bypass Bug Affecting BroadWorks Platform

In January 2024, Chinese language state hackers had been linked to assaults exploiting a vital vCenter Server zero-day (CVE-2023-34048) since late 2021, which led to the deployment of VirtualPita and VirtualPie backdoors on compromised ESXi methods.

Picus Blue Report 2025

46% of environments had passwords cracked, practically doubling from 25% final yr.

Get the Picus Blue Report 2025 now for a complete have a look at extra findings on prevention, detection, and knowledge exfiltration developments.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular