Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

European offshore wind power for a competitive EU steel industry

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » China-linked hackers have been using the new VMware Zero Day since October 2024
Identity

China-linked hackers have been using the new VMware Zero Day since October 2024

userBy userSeptember 30, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

September 30, 2025Ravi LakshmananZero Day/Vulnerability

vmware zero day

Newly patched security flaws affecting Broadcom VMware tools and VMware Aria operations have been exploited as zero days in the wild, as zero days since mid-October 2024, and since mid-October 2024, newly patched security flaws affecting Broadcom VMware tools and VMware Aria operations, according to NVISO Labs.

The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), a local privilege escalation bug affecting the following versions –

VMware Cloud Foundation 4.x and 5.x VMware Cloud Foundation 9.xxx VMware Cloud Foundation 13.xxx (Windows, Linux) VMware VSphere Foundation 9.xxx VSphere Foundation 13.XXX (Windows, Linux) VMware Aria Operations 8.X VMware Tools 11.xx, 12.xx, and 13.xx (dinc), dinx (denx), denx (dent) bmware Telco Cloud Infrastructure 2.x and 3.x

DFIR Retainer Service

“Malicious local actors with unmanagement privileges that can access a VM using VMware Tools can enable SDMP to be installed and managed by ARIA operations. This vulnerability can be exploited to escalate the privileges of rooting the same VM.”

The fact that it is a local privilege escalation means that the enemy must ensure access to infected devices through other means.

NVISO researcher Maxime Thiebaut has been recognized for discovering and reporting shortcomings during incident response engagement on May 19, 2025. The company also states that VMware Tools 12.4.9, part of VMware Tools 12.5.4, will correct issues with Windows 32-bit systems and versions of open VM tools that address CVE-2025-41244 will be distributed by Linux vendors.

Vulnerable get_version() function

Broadcom doesn’t mention that it is being exploited in actual attacks, but NVISO Labs attributes the activity to the threat actor Google Mandiant track linked to China.

“If successful, the exploitation of local privilege escalation will result in unprivileged users to achieve code execution in privileged contexts (such as root),” says Thiebaut. “However, we cannot assess whether this exploit was part of the capabilities of UNC5174, or whether the use of zero-days was a coincidence due to its triviality.”

NVISO says the vulnerability is rooted in a function called “get_version()”, which uses a listening socket to retrieve a regular expression (regex) pattern as input for each process, checking whether the binary associated with that process matches the pattern, and if so, invokes the version command for a supported service.

“This feature works as expected with system binaries (such as /usr/bin/httpd), but also matches the extensive use of \s character classes (matching non-white characters) in some regex patterns (e.g. /tmp/httpd).” “These non-system binaries are located in directories that can be written to users who are not praised in their design (e.g. /TMP).”

CIS Build Kit

As a result, this opens the door to potential abuse by staging malicious binaries in “/TMP/HTTPD”, and privilege escalation occurs when the VMware metrics collection is executed. What bad actors need to exploit the flaw is to make sure the binary is run by an unprivileged user and opens a random listening socket.

The Brussels-based cybersecurity company observed using the location “/TMP/HTTPD” to stage malicious binaries, and observed that it increased the root shell to achieve code execution. The exact nature of the payload performed using this method is unknown at this stage.

“The broad practice of mimicking system binaries (e.g. HTTPD) highlights the real possibility that several other malware stocks have mistakenly benefited from unintended escalations of privilege for years.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleSea of ​​Saharan ‘Star Dunes’ collides with the terrain of another world where two countries meet – Earth from space
Next Article Context is the key to effective incident response
user
  • Website

Related Posts

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

February 9, 2026

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

February 9, 2026

OpenClaw integrates VirusTotal scanning to detect malicious ClawHub skills

February 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

European offshore wind power for a competitive EU steel industry

TeamPCP worm exploits cloud infrastructure to build criminal infrastructure

BeyondTrust fixes critical pre-authentication RCE vulnerability in remote support and PRA

Working together to build the fusion energy supply chain of the future

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.