Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026

Badges, Bytes and Blackmail

February 7, 2026

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Facebook X (Twitter) Instagram
Saturday, February 7
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Broadcom Issues Patches for VMware NSX and vCenter Security Flaws
News

Broadcom Issues Patches for VMware NSX and vCenter Security Flaws

Team-CWDBy Team-CWDOctober 1, 2025No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


A set of substantial security updates for VMware NSX and vCenter has been released by Broadcom, addressing multiple high-severity vulnerabilities that could expose enterprise systems to cyberattacks.

The flaws, disclosed in the latest VMware vCenter and NSX updates, address multiple vulnerabilities (CVE-2025-41250, CVE-2025-41251, CVE-2025-41252), that were reported by the US National Security Agency and independent security researchers.

They affect several Broadcom products, including VMware Cloud Foundation, NSX-T and VMware Telco Cloud Platform.

One of the most severe issues, tracked as CVE-2025-41250, is an SMTP header injection bug in vCenter. With a CVSSv3 base score of 8.5, it allows attackers with non-administrative privileges to modify email notifications associated with scheduled tasks. Broadcom said no workarounds are available and users should apply the fixed versions immediately.

Two other flaws in VMware NSX, CVE-2025-41251 and CVE-2025-41252, stem from weaknesses in the authentication process. Both enable unauthenticated attackers to enumerate valid usernames, a step that could support brute-force or unauthorized login attempts.

“Based on the information at hand, these vulnerabilities might be combined to create a viable attack path from unauthenticated reconnaissance to authenticated compromise,” said Mayuresh Dani, security research manager at Qualys Threat Research Unit.

“Once authenticated (considering limited privileges), threat actors will exploit the vCenter SMTP header injection to potentially redirect sensitive communication and escalate their privileges.”

Read more on cybersecurity patch management: Seven Steps to Building a Mature Vulnerability Management Program

The vulnerabilities are classified as “High” with CVSS scores ranging from 7.5 to 8.5. The weaknesses affect a wide span of VMware infrastructure solutions used in enterprise and telecom environments.

According to the Broadcom advisory, the following products are impacted:

“The two NSX bugs allow unauthenticated users to confirm which usernames exist on a system,” explained Jason Soroko, senior fellow at Sectigo.

“Even without direct code execution, these kinds of flaws are attractive building blocks that adversaries combine with weak or reused credentials to pivot deeper, which helps explain why an intelligence agency would flag them despite High, rather than Critical, ratings.”

Broader Disclosure

Alongside these patches, Broadcom also revealed three other vulnerabilities in VMware Aria Operations and VMware Tools.

These flaws (CVE-2025-41244, CVE-2025-41245, CVE-2025-41246) could allow attackers to escalate privileges to root, steal credentials or access guest VMs.

“The last time the NSA reported VMware vulnerabilities was when Russian state-sponsored actors were actively exploiting them,” Dani noted, referencing CVE-2020-4006.

“This suggests the agency may have intelligence indicating potential exploitation interest from nation-state actors.”

At the time of publication, Soroko clarified: “There is no public confirmation that the NSX username enumeration bugs or the vCenter SMTP header injection were exploited in the wild.”

Still, administrators are urged to update affected systems as soon as possible to mitigate risks. Fixed versions and documentation are available through Broadcom’s support site.

Image credit: CryptoFX / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleSolarWinds Releases Hotfix for Critical CVE-2025-26399 Remote Code Execution Flaw
Next Article U.S. Secret Service Seizes 300 SIM Servers, 100K Cards Threatening U.S. Officials Near UN
Team-CWD
  • Website

Related Posts

News

China-Linked UAT-8099 Targets IIS Servers in Asia with BadIIS SEO Malware

February 7, 2026
News

Badges, Bytes and Blackmail

February 7, 2026
News

Ex-Google Engineer Convicted for Stealing AI Secrets for China Startup

February 7, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Here’s what you should know

February 6, 2026

Common Apple Pay scams, and how to stay safe

January 22, 2026

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.