Open Nav
Sign Up

High-Risk Authentication Bypass Vulnerability in VMWare Tools (CVE-2025-22230)

CVE-2025-22230

Filip Dimitrov

March 26, 2025

A new high-severity vulnerability (CVE-2025-22230) has been disclosed in VMware Tools for Windows. The flaw allows a local user with non-administrative privileges to bypass authentication and perform high-privilege operations within the guest VM. While there’s no indication of active exploitation yet, the potential for abuse makes this a critical issue for environments relying on VMware Tools.

Key Details

CVE ID: CVE-2025-22230
Severity: High (CVSS v3 score: 7.8)
Affected Version: 11.x.x and 12.x.x before 12.5.1
Patched Version: VMware Tools 12.5.1 (Release Notes)

Impact

The vulnerability only affects the Windows versions of VMWare Tools, so macOS and Linux users are not at risk.

The vulnerability is caused by improper access control, which allows a low-privilege user within a Windows guest VM to escalate privileges and execute unauthorized operations. In shared or sensitive environments, this could be leveraged to disable security tools, gain persistence, or access protected data – all without needing admin credentials.

For organizations relying on virtual desktop infrastructure (VDI), test environments, or sandboxed Windows VMs, this flaw could become an entry point for deeper compromise if not addressed swiftly.

Remediation

Broadcom has released a patched version of VMWare Tools that addresses this issue (12.5.1). We recommend the following actions:

  • Immediately update all Windows guest VMs running affected versions of VMware Tools.
  • Verify update deployment through system management tools or vulnerability scanners.
  • Monitor for any unusual privilege escalation attempts within guest VMs.
  • If patching is delayed, implement enhanced monitoring and alerting for VM activity.
Under Cyber Attack?

Fill out the form and we will contact you immediately.