Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Why so many people get hacked by government spyware

Understanding the UK’s eternal chemical problem

Scribe, working to show where AI really pays dividends, hits $1.3 billion valuation

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » CISA warns that VMware zero-day was exploited in active attack by China-linked hackers
Identity

CISA warns that VMware zero-day was exploited in active attack by China-linked hackers

userBy userOctober 31, 2025No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

October 31, 2025Ravi LakshmananVulnerability/Cyber ​​attack

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a high-severity security flaw affecting Broadcom VMware Tools and VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog after receiving reports of it being exploited in the wild.

The vulnerability in question, CVE-2025-41244 (CVSS score: 7.8), could be exploited by an attacker to gain root-level privileges on an affected system.

“Broadcom VMware Aria Operations and VMware Tools contain privileges with defined unsafe action vulnerabilities,” CISA said in the alert. “A malicious local attacker with non-administrative privileges who has access to a VM with VMware Tools installed and managed by Aria Operations that has SDMP enabled could exploit this vulnerability to escalate privileges to root on the same VM.”

DFIR retainer service

The vulnerability was addressed by Broadcom’s VMware last month, but had not been addressed since mid-October 2024 before being exploited as a zero-day by an unknown attacker, according to NVISO Labs. The cybersecurity firm said it discovered the vulnerability during an incident response operation in early May of this year.

This activity is believed to be the work of a China-linked threat actor, tracked by Google Mandiant as UNC5174, and NVISO Labs describes the flaw as easy to exploit. Details regarding the exact payload executed after CVE-2025-41244 was weaponized are currently pending.

“A successful local privilege escalation exploit could result in an unprivileged user executing code in a privileged context (such as root),” said security researcher Maxime Thiebaut. “However, we cannot assess whether this exploit was part of the functionality of UNC5174 or whether the use of the zero-day was simply done by chance due to its triviality.”

The KEV catalog also contains a critical XWiki eval injection vulnerability. This vulnerability could allow guest users to execute arbitrary remote code via a specially crafted request to the ‘/bin/get/Main/SolrSearch’ endpoint. Earlier this week, VulnCheck revealed that it had observed attempts by unknown attackers to exploit this flaw to distribute cryptocurrency miners.

Federal civilian executive branch (FCEB) agencies must apply the necessary mitigations by November 20, 2025 to protect their networks from active threats.


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticlePromoting EU innovation in tellurium-free thermoelectric materials
Next Article Eclipse Foundation revokes leaked open VSX tokens following Wiz discovery
user
  • Website

Related Posts

Hyper-V Malware, Malicious AI Bots, RDP Exploits, WhatsApp Lockdown and More

November 10, 2025

New Browser Security Report Reveals New Threats to Enterprises

November 10, 2025

Massive ClickFix phishing attack using PureRAT malware targets hotel systems

November 10, 2025
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Why so many people get hacked by government spyware

Understanding the UK’s eternal chemical problem

Scribe, working to show where AI really pays dividends, hits $1.3 billion valuation

6Sense founder Amanda Carlow raises $30 million for new human-replacement AI sales startup 1Mind

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Meet Your Digital Twin: Europe’s Cutting-Edge AI is Personalizing Medicine

TwinH: The AI Game-Changer for Faster, More Accessible Legal Services

Immortality is No Longer Science Fiction: TwinH’s AI Breakthrough Could Change Everything

The AI Revolution: Beyond Superintelligence – TwinH Leads the Charge in Personalized, Secure Digital Identities

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2025 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.