We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-41226

Guest Operations Denial-of-Service Vulnerability



Description

VMware ESXi contains a denial-of-service vulnerability that occurs when performing a guest operation. A malicious actor with guest operation privileges on a VM, who is already authenticated through vCenter Server or ESXi may trigger this issue to create a denial-of-service condition of guest VMs with VMware Tools running and guest operations enabled.

Reserved 2025-04-16 | Published 2025-05-20 | Updated 2025-05-20 | Assigner vmware


MEDIUM: 6.8CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

Problem types

CWE-400 Uncontrolled Resource Consumption

Product status

Default status
unaffected

8.0 before ESXi80U3se-24659227
affected

7.0 before ESXi70U3sv-24723868
affected

Default status
unaffected

5.x, 4.5.x
affected

Default status
unaffected

5.x, 4.x, 3.x, 2.x
affected

Default status
unaffected

3.x, 2.x
affected

References

support.broadcom.com/...l/content/SecurityAdvisories/0/25717

cve.org (CVE-2025-41226)

nvd.nist.gov (CVE-2025-41226)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-41226

Support options

Helpdesk Chat, Email, Knowledgebase