[CIVN-2025-0266] Multiple Vulnerabilities in VMware Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in VMware Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
VMware NSX versions 4.2.x, 4.1.x, 4.0.x
NSX-T versions 3.x
VMware Cloud Foundation versions 4.5.x, 5.x, 9.x.x.x
VMware vSphere Foundation 9.x.x.x
VMware vCenter Server versions 7.0, 8.0
VMware Telco Cloud Platform versions 5.x, 4.x, 3.x, 2.x
VMware Telco Cloud Infrastructure versions 3.x, 2.x
Overview
Multiple vulnerabilities have been reported in VMware products, which could allow a remote attacker to inject malicious email headers, exploit weak password recovery mechanisms, or enumerate valid usernames on the targeted system.
Target Audience:
Enterprises and large organisations, cloud service providers, and industries with IT environments utilising VMware products.
Risk Assessment:
High risk of credential exposure, username enumeration, and manipulation of notification emails.
Impact Assessment:
Potential for exposure of valid usernames, brute-force attacks, or manipulation of scheduled task notification emails.
Description
VMware provides virtualisation software solutions that enable organisations to create and manage virtual machines (VMs), allowing multiple operating systems to run on a single physical machine.
These vulnerabilities affect VMware products due to the presence of an SMTP header injection flaw, a weak password recovery mechanism and a username enumeration vulnerability. An attacker with non-administrative privileges on vCenter who has permission to create scheduled tasks could manipulate notification emails sent for scheduled tasks, while separate flaws in VMware NSX could allow attackers to recover weak passwords or enumerate valid usernames on the system.
Successful exploitation of this vulnerability could allow a remote attacker to inject malicious email headers, exploit weak password recovery mechanisms, or enumerate valid usernames on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36150
Vendor Information
VMware
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36150
References
VMware
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36150
CVE Name
CVE-2025-41250
CVE-2025-41251
CVE-2025-41252
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–
iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmjyKqQACgkQ3jCgcSdc
ys9Btw//R960B13SJPv+7YXSoSiPh3aI98cS8BSjUn1WhUOlTQYSBbcrbzOENKss
847OoDMdwFQJNwVuhFAVehT26/j5r+AFX3sBTgCW551lQyECDsXy8X+hCMB0Q7dw
dGWSkf1owbtxBoRPirG9sTuZMD2Ktex8TTDDsOpC6v+b5wGD6rOjsjJyeHClUxec
40jj4iNr9/Hh9EhTPvzUTZbCxkwRfo4Gpd8SKH/mkPq8+tfD0DkhOvfNz+z9jOhn
qurHQY2wsAhVo2ljHqXFRYEcc9sfbt5gnEuJdGDT5mVCgkj9kgXeZuws5yBJ7SkU
ZiZOYPN8WuYfMeKJ+iZU1e29I5CRfLPgdAHQHBUq8au1FHQsexSRSjOQDBePIuhl
cQpZ+v01w82DcCXHJwpqUjaqlBx2QBAPbizyE4KU72hgRfsew2W+uX30bkulf0NH
UYxlR6QH++piiQVqkcYWmEqdOJkInQOa8pLPukv5m/7ROL2d/Uhh2ps5MRktaWUd
tHbKaK9gbLfOSw75Re4onOclrIrCGP7qtYTJOFtYMtB8lersj3bmagwF3zynq/VM
I4hhRBw8ayr53LjDCAs8Nt7I901CDljVyPCys04FZ3kkxN4HyqnqGU4AM6QIa7MJ
Yz+7QD3PNUhB9qzyCjyPwfYyB21+FwWtQGt6zTg/AllhNtwgbFM=
=C0cg
—–END PGP SIGNATURE—–