Article Details

Scrape Timestamp (UTC): 2025-03-26 04:25:18.405

Source: https://thehackernews.com/2025/03/new-security-flaws-found-in-vmware.html

Original Article Text

Click to Toggle View

New Security Flaws Found in VMware Tools and CrushFTP — High Risk, No Workaround. Broadcom has issued security patches to address a high-severity security flaw in VMware Tools for Windows that could lead to an authentication bypass. Tracked as CVE-2025-22230, the vulnerability is rated 7.8 on the ten-point Common Vulnerability Scoring System (CVSS). "VMware Tools for Windows contains an authentication bypass vulnerability due to improper access control," Broadcom said in an alert issued Tuesday. "A malicious actor with non-administrative privileges on a Windows guest VM may gain the ability to perform certain high-privilege operations within that VM." Credited with discovering and reporting the flaw is Sergey Bliznyuk of Russian cybersecurity company Positive Technologies. CVE-2025-22230 impacts VMware Tools for Windows versions 11.x.x and 12.x.x. It has been fixed in version 12.5.1. There are no workarounds that address the issue. CrushFTP Discloses New Flaw The development comes as CrushFTP has warned customers of an "unauthenticated HTTP(S) port access" vulnerability affecting CrushFTP versions 10 and 11. It has yet to be assigned a CVE identifier. "This issue affects CrushFTP v10/v11 but does not work if you have the DMZ function of CrushFTP in place," the company said. "The vulnerability was responsibly disclosed, it is not being used actively in the wild that we know of, no further details will be given at this time." According to details shared by cybersecurity company Rapid7, successful exploitation of the vulnerability could lead to unauthenticated access via an exposed HTTP(S) port. With security flaws in VMware and CrushFTP previously exploited by malicious actors, it's essential that users move quickly to apply the updates as soon as possible.

Daily Brief Summary

CYBERCRIME // New Security Flaws in VMware and CrushFTP Demand Urgent Patches

Broadcom has released patches for a serious security flaw in VMware Tools for Windows, identified as CVE-2025-22230 with a CVSS score of 7.8, allowing for authentication bypass.

The vulnerability specifically impacts non-administrative users allowing them to perform high-privilege actions within Windows guest VMs on affected VMware Tools versions 11.x.x and 12.x.x.

No workaround is available for this VMware issue; updating to version 12.5.1 is required to mitigate the risk.

Another unrelated flaw has surfaced in CrushFTP versions 10 and 11, enabling unauthenticated HTTP(S) port access, though it’s not actively being exploited in the wild as per current reports.

The CrushFTP vulnerability, which hasn't been assigned a CVE identifier yet, can be controlled by activating the DMZ function, which prevents exploitation.

Both vulnerabilities are critical as previous security weaknesses in VMware Tools and CrushFTP have been known to be exploited by malicious parties.

Organizations using VMware Tools and CrushFTP are advised to apply the security updates promptly to avoid potential breaches and unauthorized access.