CVE-2025-41238

9.3 CRITICAL

📋 TL;DR

A heap-overflow vulnerability in VMware's PVSCSI controller allows local administrative users within a virtual machine to execute code on the host system. This affects VMware ESXi, Workstation, and Fusion products. On ESXi, exploitation is limited to the VMX sandbox under unsupported configurations, while Workstation and Fusion could allow full host compromise.

💻 Affected Systems

Products:
  • VMware ESXi
  • VMware Workstation
  • VMware Fusion
Versions: Specific affected versions not provided in CVE description; check vendor advisory for details
Operating Systems: All supported guest and host operating systems
Default Config Vulnerable: ✅ No
Notes: On ESXi, exploitable only with configurations that are unsupported. Requires PVSCSI controller usage.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full code execution on the host system from within a compromised virtual machine, potentially leading to complete host takeover and lateral movement.

🟠

Likely Case

Privileged attackers within virtual machines could escape to the host on Workstation/Fusion, while ESXi exploitation remains constrained to the VMX sandbox.

🟢

If Mitigated

With proper access controls and supported configurations, risk is significantly reduced, especially on ESXi where the VMX sandbox provides containment.

🌐 Internet-Facing: LOW - This vulnerability requires local administrative access within a virtual machine, not directly exploitable from the internet.
🏢 Internal Only: HIGH - Malicious insiders or compromised virtual machines with administrative privileges pose significant risk to virtualization infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local administrative privileges within the virtual machine. Heap overflow exploitation typically requires specific memory manipulation knowledge.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877

Restart Required: Yes

Instructions:

1. Review the vendor advisory for affected versions
2. Download and apply the appropriate security patch from VMware
3. Restart affected virtual machines and hosts
4. Verify patch installation

🔧 Temporary Workarounds

Disable PVSCSI Controller

all

Remove or disable the Paravirtualized SCSI controller from virtual machine configurations

VMware-specific configuration changes via vSphere Client, Workstation UI, or Fusion UI

Restrict Administrative Access

all

Limit local administrative privileges within virtual machines to trusted users only

🧯 If You Can't Patch

  • Isolate affected virtual machines on separate network segments
  • Implement strict monitoring and logging for VM escape attempts

🔍 How to Verify

Check if Vulnerable:

Check VMware product version against vendor advisory. Verify if PVSCSI controller is enabled in VM configuration.

Check Version:

ESXi: esxcli system version get; Workstation: Help > About; Fusion: VMware Fusion > About VMware Fusion

Verify Fix Applied:

Confirm installed VMware version matches or exceeds patched version from advisory. Verify PVSCSI controller functionality if workaround was applied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual VMX process behavior
  • PVSCSI controller error messages
  • Memory access violations in host logs

Network Indicators:

  • Unusual network traffic from VMX processes
  • Unexpected outbound connections from virtualization hosts

SIEM Query:

Search for 'PVSCSI' errors or 'heap overflow' in VMware logs combined with privilege escalation events

🔗 References

📤 Share & Export