{"id":561,"date":"2025-03-26T18:26:14","date_gmt":"2025-03-26T18:26:14","guid":{"rendered":"https:\/\/www.techrepublic.com\/?p=4299888"},"modified":"2025-03-26T18:26:14","modified_gmt":"2025-03-26T18:26:14","slug":"update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication","status":"publish","type":"post","link":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/","title":{"rendered":"Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication"},"content":{"rendered":"<figure id=\"attachment_4299889\" aria-describedby=\"caption-attachment-4299889\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-4299889\" src=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o.jpg\" alt=\"VMWare headquarters.\" width=\"1024\" height=\"768\" srcset=\"https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o.jpg 1024w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-300x225.jpg 300w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-270x203.jpg 270w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-768x576.jpg 768w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-50x38.jpg 50w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-170x128.jpg 170w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-60x45.jpg 60w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-540x405.jpg 540w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-340x256.jpg 340w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-120x90.jpg 120w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-810x608.jpg 810w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-510x384.jpg 510w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-180x135.jpg 180w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-770x578.jpg 770w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-370x278.jpg 370w, https:\/\/assets.techrepublic.com\/uploads\/2025\/03\/5651925730_1db936be13_o-740x555.jpg 740w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\"><figcaption id=\"caption-attachment-4299889\" class=\"wp-caption-text\">Image: Ferran Rodenas\/Flickr\/Creative Commons<\/figcaption><\/figure>\n<p>If you use VMware Tools for Windows, it is critical to update to the latest version. Broadcom, which acquired VMware for $69 billion in 2023, has issued a patch for a high-severity vulnerability that is actively being exploited by cybercriminals.<\/p>\n<p>The vulnerability affects VMware Tools for Windows versions 11.x.x and 12.x.x, but has been patched in version 12.5.1. Broadcom confirmed that no workarounds are available, so affected users should update immediately.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_the_details_about_this_authentication_bypass_vulnerability\"><\/span>What are the details about this authentication bypass vulnerability?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><a href=\"https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/25518\" target=\"_blank\" rel=\"noopener\">VMware Tools for Windows<\/a> is a suite of utilities that enhances the performance and functionality of Windows-based virtual machines running on VMware platforms. It supports functions like display resolution, seamless mouse and keyboard integration, and better time synchronization between host and guest systems.<\/p>\n<p>CVE-2025-22230 is classified as an \u201cauthentication bypass vulnerability,\u201d according to Broadcom\u2019s security advisory. While technical details remain limited, Broadcom suggests that the flaw results from improper access control mechanisms in some versions of VMware Tools for Windows.<\/p>\n<p>\u201cA malicious actor with non-administrative privileges on a Windows guest (virtual machine) may gain (the) ability to perform certain high-privilege operations within that VM,\u201d the company said.<\/p>\n<p>The vulnerability has a CVSS score of 7.8 out of 10, indicating a high-severity issue. It does not require user interaction for exploitation.<\/p>\n<p>The vulnerability was reported by Sergey Bliznyuk of Positive Technologies, a Russian cybersecurity firm sanctioned by the U.S. Treasury in 2021 for allegedly providing security tools to and hosting recruitment events for Russian intelligence services.<\/p>\n<aside class=\"pinbox right\">\n<h3 class=\"heading\">Must-read security coverage<\/h3>\n<\/aside>\n<h2><span class=\"ez-toc-section\" id=\"VMware_vulnerabilities_are_oft-targeted\"><\/span>VMware vulnerabilities are oft-targeted<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Earlier this month, Broadcom patched three actively exploited <a href=\"https:\/\/www.techrepublic.com\/article\/zero-day-vulnerability-vmware-broadcom-microsoft\/\">zero-day vulnerabilities<\/a> in VMware ESXi, Workstation, and Fusion. These required attackers to have administrator or root access to a virtual machine, but if they did, they could escape its sandbox and breach the underlying hypervisor, potentially exposing all connected virtual machines and sensitive data. At the time, nearly 41,500 VMWare ESXi instances were identified as vulnerable due to <a href=\"https:\/\/x.com\/Shadowserver\/status\/1897375815605870833\" target=\"_blank\" rel=\"noopener\">CVE-2025-22224<\/a>.<\/p>\n<p>Last year, VMware ESXi servers were hit by a double-extortion <a href=\"https:\/\/www.techrepublic.com\/article\/vmware-esxi-ransomware-cicada3301\/\">ransomware variant<\/a>, with the threat actors impersonating a real organization. Hackers like to target VMware as it is widely used in enterprise. Furthermore, compromising the hypervisor can allow attackers to disable multiple virtual machines simultaneously and remove recovery options such as snapshots or backups, ensuring a significant impact on a business\u2019s operations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Image: Ferran Rodenas\/Flickr\/Creative Commons If you use VMware Tools for Windows, it is critical to update to the latest version. Broadcom, which acquired VMware for $69 billion in 2023, has issued a patch for a high-severity vulnerability that is actively being exploited by cybercriminals. The vulnerability affects VMware Tools for Windows versions 11.x.x and 12.x.x, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":562,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-561","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-technology"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication - TecnoArtesanos Tech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication - TecnoArtesanos Tech Blog\" \/>\n<meta property=\"og:description\" content=\"Image: Ferran Rodenas\/Flickr\/Creative Commons If you use VMware Tools for Windows, it is critical to update to the latest version. Broadcom, which acquired VMware for $69 billion in 2023, has issued a patch for a high-severity vulnerability that is actively being exploited by cybercriminals. The vulnerability affects VMware Tools for Windows versions 11.x.x and 12.x.x, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"TecnoArtesanos Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2025-03-26T18:26:14+00:00\" \/>\n<meta name=\"author\" content=\"Sergio Morales\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sergio Morales\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/\",\"name\":\"Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication - TecnoArtesanos Tech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication.jpg\",\"datePublished\":\"2025-03-26T18:26:14+00:00\",\"author\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\"},\"breadcrumb\":{\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#primaryimage\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication.jpg\",\"contentUrl\":\"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication.jpg\",\"width\":1024,\"height\":768},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.tecnoartesanos.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#website\",\"url\":\"https:\/\/blog.tecnoartesanos.com\/\",\"name\":\"TecnoArtesanos Tech Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807\",\"name\":\"Sergio Morales\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g\",\"caption\":\"Sergio Morales\"},\"sameAs\":[\"https:\/\/sergiomorales.space\"],\"url\":\"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication - TecnoArtesanos Tech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication - TecnoArtesanos Tech Blog","og_description":"Image: Ferran Rodenas\/Flickr\/Creative Commons If you use VMware Tools for Windows, it is critical to update to the latest version. Broadcom, which acquired VMware for $69 billion in 2023, has issued a patch for a high-severity vulnerability that is actively being exploited by cybercriminals. The vulnerability affects VMware Tools for Windows versions 11.x.x and 12.x.x, [&hellip;]","og_url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/","og_site_name":"TecnoArtesanos Tech Blog","article_published_time":"2025-03-26T18:26:14+00:00","author":"Sergio Morales","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sergio Morales","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/","url":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/","name":"Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication - TecnoArtesanos Tech Blog","isPartOf":{"@id":"https:\/\/blog.tecnoartesanos.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#primaryimage"},"image":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication.jpg","datePublished":"2025-03-26T18:26:14+00:00","author":{"@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807"},"breadcrumb":{"@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#primaryimage","url":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication.jpg","contentUrl":"https:\/\/blog.tecnoartesanos.com\/wp-content\/uploads\/2025\/03\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication.jpg","width":1024,"height":768},{"@type":"BreadcrumbList","@id":"https:\/\/blog.tecnoartesanos.com\/index.php\/2025\/03\/26\/update-vmware-tools-for-windows-now-high-severity-flaw-lets-hackers-bypass-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.tecnoartesanos.com\/"},{"@type":"ListItem","position":2,"name":"Update VMware Tools for Windows Now: High-Severity Flaw Lets Hackers Bypass Authentication"}]},{"@type":"WebSite","@id":"https:\/\/blog.tecnoartesanos.com\/#website","url":"https:\/\/blog.tecnoartesanos.com\/","name":"TecnoArtesanos Tech Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.tecnoartesanos.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/ec88bc1410fd158963717c4216f04807","name":"Sergio Morales","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.tecnoartesanos.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3d45178fc8fbbe32d39278bc504fa9093f947f406ff4f1ddcfa27505ab772184?s=96&d=mm&r=g","caption":"Sergio Morales"},"sameAs":["https:\/\/sergiomorales.space"],"url":"https:\/\/blog.tecnoartesanos.com\/index.php\/author\/sergiomorales\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/561","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/comments?post=561"}],"version-history":[{"count":0,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/posts\/561\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media\/562"}],"wp:attachment":[{"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/media?parent=561"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/categories?post=561"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.tecnoartesanos.com\/index.php\/wp-json\/wp\/v2\/tags?post=561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}