Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41251: CWE-640 Weak Password Recovery Mechanism for Forgotten Password in vmware NSX

0
High
VulnerabilityCVE-2025-41251cvecve-2025-41251cwe-640
Published: Mon Sep 29 2025 (09/29/2025, 18:45:16 UTC)
Source: CVE Database V5
Vendor/Project: vmware
Product: NSX

Description

VMware NSX contains a weak password recovery mechanism vulnerability. An unauthenticated malicious actor may exploit this to enumerate valid usernames, potentially enabling brute-force attacks. Impact: Username enumeration → credential brute force risk. Attack Vector: Remote, unauthenticated. Severity: Important. CVSSv3: 8.1 (High). Acknowledgments: Reported by the National Security Agency. Affected Products:VMware NSX 9.x.x.x, 4.2.x, 4.1.x, 4.0.x NSX-T 3.x VMware Cloud Foundation (with NSX) 5.x, 4.5.x Fixed Versions: NSX 9.0.1.0; 4.2.2.2/4.2.3.1 http://4.2.2.2/4.2.3.1 ; 4.1.2.7; NSX-T 3.2.4.3; CCF async patch (KB88287). Workarounds: None.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:02:53 UTC

Technical Analysis

CVE-2025-41251 identifies a weakness in the password recovery mechanism of VMware NSX, a network virtualization and security platform widely used in enterprise data centers and cloud environments. The vulnerability is categorized under CWE-640, which relates to weak password recovery mechanisms. Specifically, the flaw allows an unauthenticated remote attacker to enumerate valid usernames by exploiting the password recovery process. This username enumeration can be leveraged to conduct targeted brute-force attacks against user accounts, increasing the likelihood of credential compromise. The affected products include VMware NSX versions 9.x.x.x, 4.2.x, 4.1.x, 4.0.x, NSX-T 3.x, and VMware Cloud Foundation with NSX versions 5.x and 4.5.x. The vulnerability does not require any prior authentication or user interaction, making it accessible to remote attackers. The CVSS v3.1 score of 8.1 reflects high severity due to the potential for complete compromise of confidentiality, integrity, and availability of the affected systems. No workarounds are available, but VMware has released patches in versions such as NSX 9.0.1.0, 4.2.2.2/4.2.3.1, 4.1.2.7, NSX-T 3.2.4.3, and a Cloud Foundation async patch (KB88287). The vulnerability was responsibly disclosed by the National Security Agency, underscoring its significance. While no known exploits are currently in the wild, the ease of exploitation and the critical nature of NSX in network security infrastructure make timely patching essential.

Potential Impact

The vulnerability enables attackers to enumerate valid usernames remotely without authentication, which significantly lowers the barrier to launching brute-force attacks against user credentials. Successful exploitation can lead to unauthorized access to NSX management interfaces, allowing attackers to manipulate network virtualization and security policies, potentially disrupting network operations or exfiltrating sensitive data. Given NSX's role in securing virtualized networks and cloud environments, compromise could cascade to broader infrastructure, impacting confidentiality, integrity, and availability of critical enterprise resources. The attack vector being remote and unauthenticated increases the risk of widespread scanning and exploitation attempts. Organizations relying on affected NSX versions face increased risk of credential theft, lateral movement within networks, and potential full compromise of virtualized network environments. The absence of workarounds further elevates the urgency for patching. Although no exploits are currently known in the wild, the vulnerability's characteristics make it a prime target for attackers seeking to gain footholds in enterprise networks.

Mitigation Recommendations

1. Immediately apply the official patches released by VMware for the affected NSX versions: NSX 9.0.1.0, 4.2.2.2/4.2.3.1, 4.1.2.7, NSX-T 3.2.4.3, and the Cloud Foundation async patch (KB88287). 2. Restrict access to NSX management interfaces using network segmentation and firewall rules to limit exposure to trusted IP addresses only. 3. Implement multi-factor authentication (MFA) on all NSX management accounts to reduce the risk of credential compromise even if brute-force attacks succeed. 4. Monitor authentication logs and password recovery attempts for unusual activity indicative of username enumeration or brute-force attacks. 5. Enforce strong password policies and consider account lockout thresholds to mitigate brute-force attack effectiveness. 6. Conduct regular security assessments and penetration tests focusing on NSX environments to detect potential exploitation attempts. 7. Educate administrators and security teams about this vulnerability and the importance of timely patching and monitoring. 8. If immediate patching is not feasible, consider temporarily disabling password recovery features or restricting their access, if possible, until patches can be applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2025-04-16T09:30:25.625Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68dad52838edf801b1798cbe

Added to database: 9/29/2025, 6:51:20 PM

Last enriched: 2/27/2026, 2:02:53 AM

Last updated: 3/25/2026, 3:04:05 AM

Views: 105

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses