PT-2025-39834 · Vmware +2 · Vmware Tools +3
Maxime Thiebaut
·
Published
2025-01-01
·
Updated
2025-10-01
·
CVE-2025-41244
CVSS v3.1
7.8
7.8
High
Base vector | Vector | AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
VMware Aria Operations versions 8.x and earlier
VMware Tools versions 11.xx, 12.xx, and 13.xx
VMware Cloud Foundation versions 4.x, 5.x, 9.xxx, and 13.xxx
vSphere Foundation versions 9.xxx and 13.xxx
Telco Cloud Platform versions 4.x and 5.x
Telco Cloud Infrastructure versions 2.x and 3.x
open-vm-tools versions prior to 2:11.3.0-2ubuntu0~ubuntu20.04.8+esm1
Description
A local privilege escalation issue exists in VMware Aria Operations and VMware Tools. A local attacker with non-administrative privileges may be able to escalate their privileges to root on a VM managed by Aria Operations with SDMP enabled. The vulnerability is related to improper handling of regular expressions in the
get version()
function, allowing an attacker to execute code with elevated privileges. This flaw has been actively exploited in the wild since October 2024 by a threat actor known as UNC5174. The exploitation involves placing a malicious binary in a directory accessible to non-privileged users, such as /tmp/httpd, and leveraging a socket to gain root access. The vulnerability stems from overly permissive regular expressions used for service discovery, which can match unexpected paths. The get version.sh
script is involved in this process.Recommendations
Update VMware Aria Operations to a fixed version.
Update VMware Tools to version 12.4.9 or later, or to VMware Tools 12.5.4 or later.
Update VMware Cloud Foundation to a fixed version.
Update vSphere Foundation to a fixed version.
Update Telco Cloud Platform to a fixed version.
Update Telco Cloud Infrastructure to a fixed version.
Update open-vm-tools to version 2:11.3.0-2ubuntu0~ubuntu20.04.8+esm1 or later.
Disable the SDMP get-versions.sh script.
Exploit
Fix
LPE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2025-41244
USN-7785-1
Affected Products
Debian
Ubuntu
Vmware Aria Operations
Vmware Tools
References · 66
- 🔥 https://blog.nviso.eu/2025/09/29/you-name-it-vmware-elevates-it-cve-2025-41244 · Exploit
- https://osv.dev/vulnerability/UBUNTU-CVE-2025-41244 · Vendor Advisory
- https://ubuntu.com/security/notices/USN-7785-1 · Vendor Advisory
- https://security-tracker.debian.org/tracker/source-package/open-vm-tools · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-41244 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-41244 · Security Note
- https://cve.org/CVERecord?id=CVE-2025-41244 · Security Note
- https://ubuntu.com/security/CVE-2025-41244 · Vendor Advisory
- https://security-tracker.debian.org/tracker/CVE-2025-41244 · Vendor Advisory
- https://osv.dev/vulnerability/USN-7785-1 · Vendor Advisory
- https://twitter.com/IntCyberDigest/status/1973085957021679658 · Twitter Post
- https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36149 · Note
- https://twitter.com/transilienceai/status/1973257052525875363 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1nue1bj/cve202541244_vulnerability_a_new_vmware_tools_and · Reddit Post
- https://twitter.com/CyberWolfGuard/status/1973172379502387267 · Twitter Post