Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41238: CWE-787 Out-of-bounds Write in VMware ESXi

0
Critical
VulnerabilityCVE-2025-41238cvecve-2025-41238cwe-787
Published: Tue Jul 15 2025 (07/15/2025, 18:34:48 UTC)
Source: CVE Database V5
Vendor/Project: VMware
Product: ESXi

Description

VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:00:57 UTC

Technical Analysis

CVE-2025-41238 is a heap-overflow vulnerability classified under CWE-787 that exists in the Paravirtualized SCSI (PVSCSI) controller component of VMware ESXi, Workstation, and Fusion products. The flaw arises from an out-of-bounds write condition triggered by malicious input from within a virtual machine. An attacker with local administrative privileges on a guest VM can exploit this vulnerability to execute arbitrary code with the privileges of the VMX process on the host system. The VMX process is responsible for managing the virtual machine's execution on the host, so compromising it can lead to significant host-level control. On VMware ESXi, exploitation is constrained by the VMX sandbox and is only feasible in unsupported configurations, reducing the attack surface in typical deployments. However, on VMware Workstation and Fusion, the vulnerability can be leveraged to execute code directly on the host operating system, posing a greater risk to end-user and developer environments. The vulnerability affects VMware ESXi versions 7.0 and 8.0, as well as corresponding versions of Workstation and Fusion. The CVSS v3.1 base score is 9.3, indicating a critical severity with attack vector local, low attack complexity, no privileges required, no user interaction, and scope changed. Although no public exploits are known at this time, the high severity and potential impact necessitate immediate attention. The lack of available patches at the time of disclosure means organizations must rely on mitigating controls until updates are released.

Potential Impact

The impact of CVE-2025-41238 is severe for organizations relying on VMware virtualization technologies. Successful exploitation allows an attacker with local administrative access inside a VM to escalate privileges and execute arbitrary code on the host system, potentially compromising the entire hypervisor environment. This can lead to full host compromise, data breaches, disruption of multiple virtual machines, and lateral movement within the network. On ESXi, the risk is somewhat mitigated by sandboxing and unsupported configuration requirements, but environments using Workstation or Fusion are more exposed, as code execution on the host is more straightforward. Organizations running critical workloads on VMware ESXi, especially in unsupported configurations, face risks to confidentiality, integrity, and availability of their infrastructure. Development and testing environments using Workstation or Fusion are also at risk of host compromise. The vulnerability could be leveraged by malicious insiders or attackers who have gained VM administrative access, emphasizing the importance of strict access controls. The absence of known exploits reduces immediate risk but does not eliminate the threat, as weaponization may occur post-disclosure.

Mitigation Recommendations

1. Apply patches immediately once VMware releases updates addressing CVE-2025-41238. Monitor VMware security advisories closely. 2. Until patches are available, restrict administrative access within virtual machines to trusted personnel only, minimizing the risk of local privilege abuse. 3. Review and avoid unsupported ESXi configurations that could enable exploitation beyond the VMX sandbox. 4. Implement strict network segmentation and monitoring to detect anomalous VMX process behavior indicative of exploitation attempts. 5. Employ host-based intrusion detection systems (HIDS) on ESXi hosts and Workstation/Fusion hosts to identify suspicious activities related to VMX process or PVSCSI controller interactions. 6. Limit the use of Workstation and Fusion in sensitive environments or ensure they run on hardened hosts with minimal attack surface. 7. Regularly audit VM and host configurations to ensure compliance with VMware best practices and security hardening guides. 8. Educate administrators and users about the risks of granting local administrative privileges inside VMs and enforce the principle of least privilege. 9. Consider deploying runtime application self-protection (RASP) or similar technologies to detect and block out-of-bounds memory operations if supported.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2025-04-16T09:30:17.798Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6876a1f4a83201eaaccfe706

Added to database: 7/15/2025, 6:46:12 PM

Last enriched: 2/27/2026, 2:00:57 AM

Last updated: 3/24/2026, 10:48:01 PM

Views: 290

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses