CVE-2025-41238
Expert Analysis
Professional remediation guidance
Get tailored security recommendations from our analyst team for CVE-2025-41238. We'll provide specific mitigation strategies based on your environment and risk profile.
CVSS Score
V3.1Attack Vector Metrics
Impact Metrics
Description
VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
Available Exploits
Related News
Affected Products
Affected Versions:
Affected Versions:
Affected Versions:
Affected Versions:
EU Vulnerability Database
Monitored by ENISA for EU cybersecurity
ENISA Analysis
VMware ESXi, Workstation, and Fusion contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
Affected Products (ENISA)
ENISA Scoring
CVSS Score (3.1)
EPSS Score
ENISA References
Data provided by ENISA EU Vulnerability Database. Last updated: July 16, 2025
GitHub Security Advisories
Community-driven vulnerability intelligence from GitHub
Advisory Details
CVSS Scoring
CVSS Score
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
References
Advisory provided by GitHub Security Advisory Database. Published: July 15, 2025, Modified: July 15, 2025
Social Media Intelligence
Real-time discussions and threat intelligence from social platforms
4 fallos de seguridad críticos corregidos en VMware Workstation Pro **Las opciones de virtualización en Linux son, como seguramente ya sabe, variadas, más aún desde que VMware hizo que su software Workstation Pro sea completamente gratuito para descargar y usar en Windows y Linux, incluso para fines comerciales, sin necesidad …
Heads up - New VMware CRITICAL Security Advisory multiple CVE's in multiple products ranging from 6.2 to 9.3 https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877 VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239).
VMSA-2025-0013 New VMware CRITICAL Security Advisory For those interested, here is an excerpt from the bulletin: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239), CVSSv3 Range: 6.2-9.3 Here is the link to the advisory: [https://app.sw.broadcom.com/e/er?utm\_campaign=VCF\_FY25\_VCF\_SecurityAlert-VMSA-2025-0013\_MKT\_CM\_3645&utm\_content=VCF\_FY25\_VCF\_VMSA-2025-0013\_3645\_SecurityAlert\_MKT\_TRANS\_EM\_6845&utm\_medium=email&utm\_source=eloqua&s=3805888&lid=9775&elqTrackId=71A8805D6E7DD49817E441A69FDA985C&elq=8a922490b650442d9f2ddab089d0b4b9&elqaid=6845&elqat=1&elqak=8AF512B54AAE632B53831F1C7A3874469659983C711ACB59050CCCE8EC37C732E39E](https://app.sw.broadcom.com/e/er?utm_campaign=VCF_FY25_VCF_SecurityAlert-VMSA-2025-0013_MKT_CM_3645&utm_content=VCF_FY25_VCF_VMSA-2025-0013_3645_SecurityAlert_MKT_TRANS_EM_6845&utm_medium=email&utm_source=eloqua&s=3805888&lid=9775&elqTrackId=71A8805D6E7DD49817E441A69FDA985C&elq=8a922490b650442d9f2ddab089d0b4b9&elqaid=6845&elqat=1&elqak=8AF512B54AAE632B53831F1C7A3874469659983C711ACB59050CCCE8EC37C732E39E)