Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      CodeSOD: A Unique Way to Primary Key

      July 22, 2025

      BrowserStack launches Figma plugin for detecting accessibility issues in design phase

      July 22, 2025

      Parasoft brings agentic AI to service virtualization in latest release

      July 22, 2025

      Node.js vs. Python for Backend: 7 Reasons C-Level Leaders Choose Node.js Talent

      July 21, 2025

      The best CRM software with email marketing in 2025: Expert tested and reviewed

      July 22, 2025

      This multi-port car charger can power 4 gadgets at once – and it’s surprisingly cheap

      July 22, 2025

      I’m a wearables editor and here are the 7 Pixel Watch 4 rumors I’m most curious about

      July 22, 2025

      8 ways I quickly leveled up my Linux skills – and you can too

      July 22, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025
      Recent

      The Intersection of Agile and Accessibility – A Series on Designing for Everyone

      July 22, 2025

      Zero Trust & Cybersecurity Mesh: Your Org’s Survival Guide

      July 22, 2025

      Execute Ping Commands and Get Back Structured Data in PHP

      July 22, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025
      Recent

      A Tomb Raider composer has been jailed — His legacy overshadowed by $75k+ in loan fraud

      July 22, 2025

      “I don’t think I changed his mind” — NVIDIA CEO comments on H20 AI GPU sales resuming in China following a meeting with President Trump

      July 22, 2025

      Galaxy Z Fold 7 review: Six years later — Samsung finally cracks the foldable code

      July 22, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»New VMware Tools Vulnerability Allows Attackers to Tamper with Virtual Machines, Broadcom Issues Urgent Patch

    New VMware Tools Vulnerability Allows Attackers to Tamper with Virtual Machines, Broadcom Issues Urgent Patch

    May 13, 2025

    CVE-2025-22247

    A newly disclosed VMware Tools vulnerability could enable attackers with limited access to compromise virtual machines (VMs). Broadcom, which owns VMware, issued a security advisory warning that the flaw could be exploited to perform insecure file operations within affected VMs. 

    The vulnerability, tracked as CVE-2025-22247, affects VMware Tools versions 12.x.x and 11.x.x on Windows and Linux operating systems. According to the security bulletin (VMSA-2025-0007) released on May 12, 2025, attackers with non-administrative privileges on a guest VM can exploit this weakness to tamper with local files, potentially leading to unauthorized behaviors within the virtual environment. 

    “This vulnerability was privately reported, and we’ve taken swift action to provide patches,” Broadcom stated in the advisory. “A malicious actor with non-administrative privileges on a guest VM may tamper with the local files to trigger insecure file operations within that VM.” 

    The VMware Tools vulnerability has been rated “Moderate” in severity, with a CVSSv3 base score of 6.1. While not considered critical, the nature of the flaw could target enterprise environments where VMs often house sensitive workloads. 

    No Workarounds Available for CVE-2025-22247

    CVE-2025-22247 
    VMSA-2025-0007 Advisory Details (Source: Broadcom)

    Broadcom has confirmed that there are no workarounds for this vulnerability, and updating to a fixed version, VMware Tools 12.5.2, is the only option. For Windows users, VMware Tools 12.4.7, which is part of 12.5.2, addresses the issue specifically for 32-bit systems.

    The vulnerability doesn’t just affect the proprietary VMware Tools. Its open-source counterpart, open-vm-tools, widely used in Linux environments, is also vulnerable through the open-source version, open-vm-tools. Broadcom has issued patches to the open-vm-tools community to integrate security fixes into previous releases. Broadcom has also collaborated with Linux vendors to provide a corresponding patch, although the fixed version numbers may vary depending on the distribution and vendor. Users are advised to follow their respective Linux vendors for the updated versions. 

    The advisory also notes that macOS versions of VMware Tools are not affected by the issue. The vulnerability was responsibly reported to VMware by Sergey Bliznyuk of Positive Technologies, a cybersecurity researcher acknowledged in Broadcom’s statement. His findings led to the identification and remediation of the issue before any known exploitation occurred in the wild. 

    Summary of Affected Versions and Fixes

    Platform  Affected Versions  Fixed Version  CVSS Score  Severity 
    Windows  12.x.x, 11.x.x  12.5.2  6.1  Moderate 
    Linux  12.x.x, 11.x.x  12.5.2 (via vendors)  6.1  Moderate 
    macOS  N/A  Not Affected  N/A  N/A 

    Conclusion

    The recently disclosed VMware Tools vulnerability (CVE-2025-22247) affects versions 11.x.x and 12.x.x on both Windows and Linux platforms, with macOS remaining unaffected. With a CVSS score of 6.1 and no available workaround, it is important that system administrators take immediate action to apply the necessary patches. Failing to do so could leave virtual machines exposed to potential tampering by users with even limited access.  

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticlePeople Who Ship: Building Centralized AI Tooling
    Next Article Deepfake Defense in the Age of AI

    Related Posts

    Development

    GPT-5 is Coming: Revolutionizing Software Testing

    July 22, 2025
    Development

    Win the Accessibility Game: Combining AI with Human Judgment

    July 22, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    CVE-2025-53487 – Mediawiki ApprovedRevs Stored XSS

    Common Vulnerabilities and Exposures (CVEs)

    Automating Vultr Cloud Infrastructure with Terraform

    Development

    CVE-2025-37817 – Linux kernel Double Free in Chameleon Driver

    Common Vulnerabilities and Exposures (CVEs)

    Apache Parquet Java Vulnerability CVE-2025-46762 Exposes Systems to Remote Code Execution Attacks

    Security

    Highlights

    CVE-2025-36016 – IBM Process Mining Open Redirect Phishing Vulnerability

    June 21, 2025

    CVE ID : CVE-2025-36016

    Published : June 21, 2025, 1:15 p.m. | 51 minutes ago

    Description : IBM Process Mining 2.0.1 IF001 and 2.0.1 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim.

    Severity: 6.8 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-5475 – Sony XAV-AX8500 Bluetooth Integer Overflow Remote Code Execution Vulnerability

    June 20, 2025

    Cyberattack Hits Nova Scotia Power: Customer Data Compromised

    May 15, 2025

    China Launches the World’s First AI-Powered Underwater Data Centre: Here’s Why It Matters

    April 18, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.