Multiple vulnerabilities in VMware Workstation



Risk High
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2025-41236
CVE-2025-41237
CVE-2025-41238
CVE-2025-41239
CWE-ID CWE-190
CWE-191
CWE-122
CWE-401
Exploitation vector Network
Public exploit N/A
Vulnerable software
VMware Workstation
Client/Desktop applications / Virtualization software

Vendor VMware, Inc

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Integer overflow

EUVDB-ID: #VU113006

Risk: High

CVSSv4.0: 6.1 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2025-41236

CWE-ID: CWE-190 - Integer overflow

Exploit availability: No

Description

The vulnerability allows an attacker to compromise the host OS.

The vulnerability exists due to integer overflow in the VMXNET3 virtual network adapter. A malicious guest with administrative privileges can trigger an integer overflow and execute arbitrary code on the host OS.

Mitigation

Install update from vendor's website.

Vulnerable software versions

VMware Workstation: 17.0 - 17.6.3

CPE2.3 External links

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to open a a specially crafted file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Integer underflow

EUVDB-ID: #VU113007

Risk: Medium

CVSSv4.0: 1.4 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:U/U:Green]

CVE-ID: CVE-2025-41237

CWE-ID: CWE-191 - Integer underflow

Exploit availability: No

Description

The vulnerability allows an attacker to compromise the affected host OS.

The vulnerability exists due to integer underflow in VMCI (Virtual Machine Communication Interface). A malicious guest with local administrative privileges on a virtual machine can trigger an integer underflow and execute arbitrary code as the virtual machine's VMX process running on the host.

Mitigation

Install update from vendor's website.

Vulnerable software versions

VMware Workstation: 17.0 - 17.6.3

CPE2.3 External links

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to open a a specially crafted file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Heap-based buffer overflow

EUVDB-ID: #VU113008

Risk: Medium

CVSSv4.0: 2.5 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:H/SI:H/SA:H/E:U/U:Green]

CVE-ID: CVE-2025-41238

CWE-ID: CWE-122 - Heap-based Buffer Overflow

Exploit availability: No

Description

The vulnerability allows an attacker to compromise the host OS.

The vulnerability exists due to a boundary error in the PVSCSI (Paravirtualized SCSI) controller. A malicious guest with local administrative privileges on a virtual machine can trigger a heap-based buffer overflow and execute arbitrary code as the virtual machine's VMX process running on the host.

Mitigation

Install update from vendor's website.

Vulnerable software versions

VMware Workstation: 17.0 - 17.6.3

CPE2.3 External links

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to open a a specially crafted file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Memory leak

EUVDB-ID: #VU113009

Risk: Medium

CVSSv4.0: 1.2 [CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2025-41239

CWE-ID: CWE-401 - Missing release of memory after effective lifetime

Exploit availability: No

Description

The vulnerability allows an attacker to gain access to sensitive information.

The vulnerability exists due memory leak in vSockets. A malicious guest with local administrative privileges on a virtual machine can leak memory from processes communicating with vSockets.

Mitigation

Install update from vendor's website.

Vulnerable software versions

VMware Workstation: 17.0 - 17.6.3

CPE2.3 External links

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

How the attacker can exploit this vulnerability?

The attacker would have to trick the victim to open a a specially crafted file.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###