VMware Windows Tools Vulnerability Causes Authentication Bypass (CVE-2025-22230)

This article peeked my interest due to the nature of it being a VMware vulnerability. Between the fact that I worked for VMware for many years and I was just working inside VMware Workstation Pro building out a Windows environment the last few days made me take a second look on this article.

The bigger company and more widely used your products, the more it makes you a target for hackers. This just proves no matter how much they may dedicate to securing software, there is always someone smarter and with the time and resources to find a way in!

Below article written by Sergiu Gatlan

Broadcom released security updates today to fix a high-severity authentication bypass vulnerability in VMware Tools for Windows.

VMware Tools is a suite of drivers and utilities designed to improve performance, graphics, and overall system integration for guest operating systems running in VMware virtual machines.

The vulnerability (CVE-2025-22230) is caused by an improper access control weakness and was reported by Sergey Bliznyuk of Positive Technologies (a sanctioned Russian cybersecurity company accused of trafficking hacking tools).

Local attackers with low privileges can exploit it in low-complexity attacks that don’t require user interaction to gain high privileges on vulnerable VMs.

“A malicious actor with non-administrative privileges on a Windows guest VM may gain ability to perform certain high-privilege operations within that VM,” VMware explains in a security advisory published on Tuesday.

Earlier this month, Broadcom also patched three VMware zero days (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226), which were tagged as exploited in attacks and reported by the Microsoft Threat Intelligence Center.

As the company explained at the time, attackers with privileged administrator or root access can chain these vulnerabilities to escape the virtual machine’s sandbox.

Days after patches were released, threat monitoring platform Shadowserver found over 37,000 internet-exposed VMware ESXi instances vulnerable to CVE-2025-22224 attacks.

Ransomware gangs and state-sponsored hackers frequently target VMware vulnerabilities, as VMware products are widely used in enterprise operations to store or transfer sensitive corporate data.

For instance, in November, Broadcom warned that attackers were exploiting two VMware vCenter Server vulnerabilities: a privilege escalation to root (CVE-2024-38813) and a critical remote code execution flaw (CVE-2024-38812) identified during China’s 2024 Matrix Cup hacking contest.

In January 2024, Broadcom also disclosed that Chinese state hackers had used a critical vCenter Server zero-day vulnerability (CVE-2023-34048) since late 2021 to deploy VirtualPita and VirtualPie backdoors on affected ESXi systems.

SOURCE ARTICLE:

https://www.bleepingcomputer.com/news/security/broadcom-warns-of-authentication-bypass-in-vmware-windows-tools/?utm_source=tldrinfosec

Useful VMware Reference Posters! (NSX/VCSA 6.5/PowerCLI 6.5/PSC Toplogy Tree)

Useful VMware Reference Posters!

(NSX/VCSA 6.5/PowerCLI 6.5/PSC Toplogy Tree)

 

For all those VMware techies out there that work with VMware solutions on a daily basis, it’s hard to remember everything we need to know related to the many solutions we manage. So VMware has created several VMware Reference Posters to help us out when we need a little reminder as far as a command-line argument, configuration option, etc.

At the VMware provided website, they have provided us with (3) reference posters for working with PowerCLI 6.5 R1, vCenter Server Appliance (VCSA), and Platform Services Controllers (PSC) Topology Decision Tree. Click on the below link to go to the VMware Reference Poster site and download your copy of these great tools!

VMware Reference Posters Link:   https://blogs.vmware.com/vsphere/posters

Although not listed in the above site, there is also a NSX Reference Poster that is also available! So for those that are managing VMware NSX, I highly recommend you download this poster and keep it handy, I am sure you will need to use it at some point in time while managing NSX.

The dimensions for the NSX posters are designed to be printed in a high-resolution A3 size (no lower than 300 dpi). 

  • In inches: 11.7 x 16.5
  • In mm: 297 x 420

NSX Reference Poster (Printable Version):  Click Here to Download!

NSX Reference Poster:  Click Here to Download!

 

Virtual Network Assessment (VNA) – Sales & Technical Overview for Partners

Virtual Network Assessment (VNA) – Sales & Technical Overview for Partners

 

VMware Virtual Network Assessment is a free assessment that analyzes network traffic patterns within your data center. In 24 to 72 hours the assessment delivers:

  • Insights into the security risk (amount of East-West traffic) present in your network
  • A preview of actionable NSX micro-segmentation recommendations for your network
  • Opportunities to optimize network performance with NSX

Request your free Virtual Network Assessment today.

Why should I care about East-West traffic?

Traditional approaches to securing a data center are focused on building a strong perimeter to keep threats outside the network. However, little is done to protect the network once a threat is inside the network. East-West (server-to-server) traffic accounts for more than 80% of overall data center traffic, but it’s largely unprotected, leaving you at risk. Virtual Network Assessment shows what percent of your data center traffic is “East-West” and not protected by your perimeter firewall.

How do I get started with micro-segmentation?

It can be a labor-intensive process to figure out what security policies to put in place, requiring time-consuming tasks such as identifying which servers are talking to each other and what ports are open. Virtual Network Assessment gives you a preview of how to micro-segment your network and recommends firewall rules to help you get started.

Virtual Network Assessment (VNA) Video:   Click Here!

New Fling: vRealize Operations Email Template Manager

New Fling: vRealize Operations Email Template Manager

New Fling: vRealize Operations Email Template…

This Fling helps vRealize Operations Manager users better manage custom email notification templates.


VMware Social Media Advocacy

vSAN Troubleshooting Tools (Part 1)

vSAN Troubleshooting Tools (Part 1)

vSAN Troubleshooting Tools (Part 1)

In Part 1 of the vSAN Troubleshooting Tools series, Francis Daly covers VMware’s most useful troubleshooting tools for vSAN- vSphere web client, esxcli and more.


VMware Social Media Advocacy

Explore & play with the latest Flings from VMware!

Explore & play with the latest Flings from VMware!

Explore & play with the latest Flings from VMware!

Flings are apps and tools built by our engineers that are intended to be played with and explored.


VMware Social Media Advocacy

Automatic space reclamation (UNMAP) is back in…

Automatic space reclamation (UNMAP) is back in vSphere 6.5 -via vSphere-land

Automatic space reclamation (UNMAP) is back in…

A long time ago in a vSphere version far, far away VMware introduced support for automatic space reclamation which allowed vSphere to send UNMAP commands to a storage array so space from deleted or moved VMs could be un-allocated (reclaimed) on the storage array. This was a welcome feature as block storage arrays have no visibility inside a VMFS volume so when any data is deleted by vSphere the array is unaware of it and it remains allocated on the array. UNMAP was supposed to fix that so when data was deleted vSphere would send a string of UNMAP commands to the array telling it exactly which disk blocks it could have back.


VMware Social Media Advocacy