CVE-2025-41251

8.1 HIGH

📋 TL;DR

This vulnerability in VMware NSX allows unauthenticated attackers to enumerate valid usernames through a weak password recovery mechanism. This enables credential brute-force attacks against identified accounts. Affected organizations include those running vulnerable versions of VMware NSX, NSX-T, and VMware Cloud Foundation with NSX.

💻 Affected Systems

Products:
  • VMware NSX
  • VMware NSX-T
  • VMware Cloud Foundation (with NSX)
Versions: NSX 9.x.x.x, 4.2.x, 4.1.x, 4.0.x; NSX-T 3.x; VMware Cloud Foundation 5.x, 4.5.x
Operating Systems: All supported platforms for affected NSX versions
Default Config Vulnerable: ⚠️ Yes
Notes: All standard deployments of affected versions are vulnerable; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to NSX management interfaces, potentially compromising entire virtual infrastructure, exfiltrating sensitive data, or deploying ransomware.

🟠

Likely Case

Attackers identify valid administrative accounts and successfully brute-force credentials, gaining unauthorized access to NSX management with varying privilege levels.

🟢

If Mitigated

Username enumeration is prevented, but attackers may still attempt brute-force attacks against known accounts if other authentication weaknesses exist.

🌐 Internet-Facing: HIGH - Remote unauthenticated exploitation makes internet-facing NSX interfaces particularly vulnerable to automated scanning and attacks.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but network segmentation reduces exposure compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Username enumeration vulnerabilities are typically easy to exploit with simple HTTP requests; credential brute-forcing requires additional tools but is well-understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: NSX 9.0.1.0; NSX 4.2.2.2/4.2.3.1; NSX 4.1.2.7; NSX-T 3.2.4.3; VMware Cloud Foundation async patch (KB88287)

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36150

Restart Required: Yes

Instructions:

1. Review VMware advisory KB88287. 2. Identify affected NSX/NSX-T/Cloud Foundation deployments. 3. Apply appropriate patch version for your deployment. 4. Restart NSX services as required. 5. Verify patch application and functionality.

🧯 If You Can't Patch

  • Implement network access controls to restrict NSX management interfaces to trusted administrative networks only.
  • Enable multi-factor authentication for all NSX administrative accounts and implement account lockout policies for failed login attempts.

🔍 How to Verify

Check if Vulnerable:

Check NSX/NSX-T version via NSX Manager UI (Administration → System → Updates) or CLI command 'get version'.

Check Version:

From NSX CLI: get version

Verify Fix Applied:

Verify installed version matches patched versions listed in advisory and test password recovery functionality no longer reveals username validity.

📡 Detection & Monitoring

Log Indicators:

  • Unusual volume of password recovery requests from single IPs
  • Multiple failed login attempts following password recovery requests
  • Authentication logs showing login attempts for enumerated usernames

Network Indicators:

  • High volume of HTTP POST requests to password recovery endpoints
  • Traffic patterns showing username enumeration attempts (systematic variations in requests)

SIEM Query:

source="nsx_logs" AND (url_path="/api/password-recovery" OR message="password recovery") AND count by src_ip > threshold

🔗 References

📤 Share & Export