VMware Zero-Day LPE Flaw Exploited by China-Linked Actor Added to CISA KEV

CISA Adds Actively Exploited VMware Privilege Escalation Zero-Day (CVE-2025-41244) to KEV Catalog

HIGH
October 31, 2025
4m read
VulnerabilityThreat ActorPatch Management

Related Entities

Threat Actors

UNC5174

Organizations

Products & Tech

VMware Aria OperationsVMware ToolsVMware Cloud FoundationVMware vSphere Foundation

CVE Identifiers

CVE-2025-41244
HIGH
CVSS:7.8

Full Report

Executive Summary

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2025-41244, a high-severity local privilege escalation (LPE) vulnerability affecting Broadcom's VMware products, to its Known Exploited Vulnerabilities (KEV) catalog. The flaw, rated CVSS 7.8, allows a local non-administrative user to escalate privileges to root on a virtual machine. The vulnerability has been actively exploited as a zero-day since at least mid-October 2024 by UNC5174, a threat actor suspected to have links to China. Given the active exploitation by a sophisticated threat actor and the public availability of a proof-of-concept (PoC), immediate patching is critical.


Vulnerability Details

CVE-2025-41244 is an untrusted search path vulnerability. It exists within a shell script utilized by the Service Discovery Management Pack (SDMP) feature in VMware Aria Operations and VMware Tools. The script uses overly broad regular expressions when searching for system binaries. An attacker with low-level privileges on a guest virtual machine can exploit this by placing a malicious executable in a world-writable directory, such as /tmp/.

When the service discovery function is triggered, the vulnerable script may inadvertently execute the attacker's malicious binary instead of the legitimate system command. Because the script runs with high privileges, the attacker's code is executed as the root user, leading to a full privilege escalation.

Affected Systems

The vulnerability impacts multiple VMware products where the Service Discovery Management Pack (SDMP) is enabled:

  • VMware Aria Operations
  • VMware Tools
  • VMware Cloud Foundation
  • VMware vSphere Foundation

Administrators should consult the Broadcom security advisory for a full list of affected versions.

Exploitation Status

This vulnerability was exploited as a zero-day before a patch was available. According to researchers at NVISO Labs, who discovered and reported the flaw, the China-linked threat actor UNC5174 has been exploiting it in the wild since mid-October 2024. Following the disclosure, NVISO researchers published a technical deep-dive and a proof-of-concept (PoC) exploit. The combination of nation-state level exploitation and a public PoC significantly increases the risk for all organizations using vulnerable VMware products.

Impact Assessment

An attacker who successfully exploits CVE-2025-41244 can escalate their privileges from a standard user to root within a virtual machine. This level of access allows the attacker to:

  • Completely compromise the guest operating system.
  • Disable security controls and install persistent backdoors.
  • Access all sensitive data stored on the virtual machine.
  • Potentially attempt to escape the VM to attack the underlying hypervisor (though this is a separate, more complex attack).
  • Use the compromised VM as a staging ground for lateral movement within the network.

Cyber Observables for Detection

  • File Creation: Monitor for the creation of executable files in world-writable directories like /tmp/, especially if their names mimic common system utilities (e.g., df, ls, ps).
  • Process Monitoring: Look for the VMware service discovery process spawning unexpected child processes from directories like /tmp/.
  • Log Analysis: Review logs from VMware tools and Aria Operations for errors or unusual activity related to the service discovery feature.

Detection Methods

  • EDR/Endpoint Security: Deploy endpoint security solutions on VMs to detect and block suspicious process execution and file creation in common temporary directories. A rule that flags a process running from /tmp with root privileges would be effective. This is an example of D3-PA: Process Analysis.
  • Vulnerability Management: Scan all virtual machines for vulnerable versions of VMware Tools and Aria Operations agents.
  • Threat Hunting: Proactively hunt for the PoC's artifacts. The public PoC creates a malicious binary in /tmp/ and triggers its execution. Security teams can search for this specific behavior pattern across their VM fleet.

Remediation Steps

  1. Apply Patches: The primary and most critical step is to apply the security patches released by Broadcom for all affected VMware products. This is a direct application of M1051 - Update Software.
  2. Disable Service Discovery: If patching is not immediately feasible, consider disabling the Service Discovery Management Pack (SDMP) feature as a temporary mitigation. However, this will result in a loss of functionality.
  3. Harden Systems: Enforce security best practices on VMs, such as mounting /tmp with the noexec option to prevent the execution of binaries from that directory. This aligns with M1028 - Operating System Configuration.
  4. Verify Patching: After deployment, use vulnerability scanning tools to verify that the patches have been successfully applied and the vulnerability is remediated.

Timeline of Events

1
October 15, 2024
Approximate date when exploitation of CVE-2025-41244 as a zero-day began by UNC5174.
2
October 30, 2025
CISA adds CVE-2025-41244 to its Known Exploited Vulnerabilities (KEV) catalog.
3
October 31, 2025
This article was published

MITRE ATT&CK Mitigations

Applying the patches from Broadcom is the most direct and effective way to remediate the vulnerability.

Preventing execution from world-writable directories like /tmp by using the 'noexec' mount option can break this specific exploit chain.

If patching is not possible, disabling the Service Discovery Management Pack (SDMP) feature removes the vulnerable component.

Audit

M1047enterprise

Auditing process execution and file creation in /tmp can help detect attempts to exploit this vulnerability.

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

CVE-2025-41244VMwarezero-dayprivilege escalationCISAKEVUNC5174

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading