Tuesday, May 13, 2025
Homecyber securityVMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

VMware Tools Vulnerability Allows Attackers to Modify Files and Launch Malicious Operations

Published on

SIEM as a Service

Follow Us on Google News

Broadcom-owned VMware has released security patches addressing a moderate severity insecure file handling vulnerability in VMware Tools, tracked as CVE-2025-22247 with a CVSS base score of 6.1.

The vulnerability allows non-administrative users to manipulate files within guest virtual machines to execute unauthorized file operations.

Security updates are now available for affected Windows and Linux systems, while macOS environments remain unaffected by this security flaw.

- Advertisement - Google News

The security flaw (CVE-2025-22247) exists in the file handling mechanisms of VMware Tools, a suite of utilities that enhances the performance of virtual machines’ guest operating systems.

According to VMware’s security advisory VMSA-2025-0007 released on May 12, 2025, the vulnerability enables attackers with limited privileges to compromise file operations within the virtual machine environment.

The technical assessment identified this as an insecure file handling vulnerability, where improper validation of file operations could lead to privilege escalation or unauthorized file manipulation within the VM.

“A malicious actor with non-administrative privileges on a guest VM may tamper the local files to trigger insecure file operations within that VM,” VMware explained in its advisory.

The attack requires local access to the guest virtual machine, limiting the attack surface but still presenting significant risk to multi-user environments where VM guests may have multiple users with varying privilege levels.

The vulnerability was privately reported to VMware by security researcher Sergey Bliznyuk of Positive Technologies.

Affected Systems and Impact Assessment

The vulnerability impacts multiple versions of VMware Tools across different operating systems with varying degrees of severity.

Specifically, VMware Tools versions 11.x.x and 12.x.x running on Windows and Linux operating systems are vulnerable to exploitation.

VMware has rated the vulnerability as “Moderate” with a maximum CVSSv3 base score of 6.1, indicating potential for significant but contained damage.

The CVSS vector string (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N) reveals that while the vulnerability has low attack complexity and requires no user interaction, it can lead to low confidentiality impact but high integrity impact within affected systems.

Organizations operating virtual infrastructures with multiple users accessing the same virtual machines face the highest risk, as the vulnerability could allow less privileged users to perform unauthorized actions by exploiting the insecure file operations.

Notably, VMware Tools installations on macOS systems remain completely unaffected by this vulnerability, limiting organizational exposure for environments using Apple hardware for virtualization.

Patching and Mitigation Strategies

VMware has released VMware Tools version 12.5.2 to address the vulnerability across affected platforms.

For Windows 32-bit systems, the fix is included in VMware Tools 12.4.7, which is part of the broader 12.5.2 release package.

Linux users will receive patches through their distribution vendors as updates to the open-vm-tools package, with specific version numbers potentially varying across different Linux distributions.

The security advisory confirms no workarounds exist for this vulnerability, making patching the only viable security option.

Organizations running vulnerable VMware Tools versions are strongly advised to prioritize updates, particularly in multi-user environments where the risk of exploitation is highest.

VMware has made the patched version available through its official download channels, with complete documentation available on the Broadcom support portal.

“This vulnerability highlights the importance of maintaining current security patches even for auxiliary systems like VM tools,” noted VMware in supplementary documentation, emphasizing that virtual infrastructure security extends beyond hypervisor protection to include guest VM management tools.

Find this News Interesting! Follow us on Google News, LinkedIn, & X to Get Instant Updates!

Kaaviya
Kaaviya
Kaaviya is a Security Editor and fellow reporter with Cyber Security News. She is covering various cyber security incidents happening in the Cyber Space.

Latest articles

Scattered Spider Launches Supply Chain Attacks on UK Retail Organizations

Scattered Spider, also known as Roasting 0ktapus and Scatter Swine, has emerged as a...

Hackers Abuse PyInstaller to Deploy Stealthy macOS Infostealer

Jamf Threat Labs has identified a novel macOS infostealer that exploits PyInstaller, a legitimate...

PupkinStealer Targets Windows Users to Steal Browser Login Credentials

A newly identified information-stealing malware dubbed PupkinStealer has emerged as a significant threat to...

Repeated Firmware Key-Management Failures Undermine Intel Boot Guard and UEFI Secure Boot

The security of fundamental technologies like Intel Boot Guard and UEFI Secure Boot has...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Scattered Spider Launches Supply Chain Attacks on UK Retail Organizations

Scattered Spider, also known as Roasting 0ktapus and Scatter Swine, has emerged as a...

Hackers Abuse PyInstaller to Deploy Stealthy macOS Infostealer

Jamf Threat Labs has identified a novel macOS infostealer that exploits PyInstaller, a legitimate...

PupkinStealer Targets Windows Users to Steal Browser Login Credentials

A newly identified information-stealing malware dubbed PupkinStealer has emerged as a significant threat to...
OSZAR »