Home

Description

VMware NSX contains a weak password recovery mechanism vulnerability. An unauthenticated malicious actor may exploit this to enumerate valid usernames, potentially enabling brute-force attacks. Impact: Username enumeration → credential brute force risk. Attack Vector: Remote, unauthenticated. Severity: Important. CVSSv3: 8.1 (High). Acknowledgments: Reported by the National Security Agency. Affected Products:VMware NSX 9.x.x.x, 4.2.x, 4.1.x, 4.0.x NSX-T 3.x VMware Cloud Foundation (with NSX) 5.x, 4.5.x Fixed Versions: NSX 9.0.1.0; 4.2.2.2/4.2.3.1 http://4.2.2.2/4.2.3.1 ; 4.1.2.7; NSX-T 3.2.4.3; CCF async patch (KB88287). Workarounds: None.

PUBLISHED Reserved 2025-04-16 | Published 2025-09-29 | Updated 2025-09-30 | Assigner vmware




HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-640 Weak Password Recovery Mechanism for Forgotten Password

Product status

Default status
unaffected

VMware NSX - 9.x.x.x, 4.2.x, 4.1.x, 4.0.x
affected

VMware NSX-T - 3.x
affected

VMware Cloud Foundation (with NSX) - 5.x, 4.5.x
affected

VMware NSX 9.0.1.0; 4.2.2.2/4.2.3.1; 4.1.2.7; NSX-T 3.2.4.3; CCF async patch (KB88287)
unaffected

References

support.broadcom.com/...l/content/SecurityAdvisories/0/36150

cve.org (CVE-2025-41251)

nvd.nist.gov (CVE-2025-41251)

Download JSON