{"uuid": "419fd7d2-3c77-4032-b717-747015a7b289", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "name": "VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)", "description": "# Support Content Notification - Support Portal - Broadcom support portal\n\nRef: [https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877](https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35877)\n* Advisory ID:\u00a0: Advisory Severity:\n  * VMSA-2025-0013: Critical\n* Advisory ID:\u00a0: CVSSv3 Range:\n  * VMSA-2025-0013: 6.2-9.3\n* Advisory ID:\u00a0: Synopsis:\n  * VMSA-2025-0013: VMware ESXi, Workstation, Fusion, and Tools updates address multiple vulnerabilities (CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239)\n* Advisory ID:\u00a0: Issue date:\n  * VMSA-2025-0013: 2025-07-15\n* Advisory ID:\u00a0: Updated on:\n  * VMSA-2025-0013: 2025-07-15 (Initial Advisory)\n* Advisory ID:\u00a0: CVE(s)\n  * VMSA-2025-0013: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n\n\n1\\. Impacted Products\n---------------------\n\n*   VMware Cloud Foundation\n*   VMware vSphere Foundation\n*   VMware ESXi\n*   VMware Workstation Pro\u00a0\n*   VMware Fusion\u00a0\n*   VMware Tools\n*   VMware Telco Cloud Platform\n*   VMware Telco Cloud Infrastructure\n\n2\\. Introduction\n----------------\n\nMultiple vulnerabilities in VMware ESXi, Workstation, Fusion, and Tools were privately reported to Broadcom. Updates are available to remediate these vulnerabilities in affected Broadcom products.\u00a0\n\n3a. VMXNET3 integer-overflow\u00a0vulnerability (CVE-2025-41236)\u00a0\n------------------------------------------------------------\n\n**Description:**\u00a0VMware ESXi, Workstation, and Fusion contain an\u00a0integer-overflow\u00a0vulnerability\u00a0in the VMXNET3 virtual network adapter. Broadcom has evaluated the severity of this issue to be in the\u00a0[Critical severity range](https://www.vmware.com/support/policies/security_response.html)\u00a0with a maximum CVSSv3 base score of\u00a0[9.3](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).\n\n**Known Attack Vectors:  \n**A malicious actor with local administrative privileges on a virtual machine with VMXNET3 virtual\u00a0network\u00a0adapter may exploit this issue to execute code on the host. Non VMXNET3 virtual adapters are not affected by this issue.\n\n**Resolution:**\u00a0To remediate CVE-2025-41236 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.\n\n**Workarounds:  \n**None\n\n**Additional Documentation:  \n**A supplemental FAQ was created for clarification. Please see: [https://brcm.tech/vmsa-2025-0013-qna](https://brcm.tech/vmsa-2025-0013-qna).\n\n**Acknowledgments:**\u00a0Broadcom would like to thank Nguyen Hoang Thach (@hi\\_im\\_d4rkn3ss) of STARLabs SG working with the Pwn2Own held by Zero day initiative for reporting this issue to us.\n\n**Notes:  \n**None.\n\n3b.\u00a0VMCI\u00a0integer-underflow\u00a0vulnerability\u00a0(CVE-2025-41237)\u00a0\n----------------------------------------------------------\n\n**Description:**\u00a0VMware ESXi,\u00a0contain an\u00a0integer-underflow in VMCI (Virtual Machine Communication Interface) that leads to an out-of-bounds write. Broadcom has evaluated the severity of this issue to be in the\u00a0[Critical severity range](https://www.vmware.com/support/policies/security_response.html)\u00a0with a maximum CVSSv3 base score of\u00a0[9.3](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).\n\n**Known Attack Vectors:  \n**A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.\n\n**Resolution:**\u00a0To remediate CVE-2025-41237 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.\n\n**Workarounds:  \n**None\n\n**Additional Documentation:  \n**A supplemental FAQ was created for clarification. Please see: [https://brcm.tech/vmsa-2025-0013-qna](https://brcm.tech/vmsa-2025-0013-qna).\n\n**Acknowledgments:**\u00a0Broadcom would like to thank Corentin BAYET (@OnlyTheDuck) of REverse Tactics (@Reverse\\_Tactics) working with the Pwn2Own held by Zero day initiative for reporting this issue to us.\n\n**Notes:  \n**None\n\n3c. PVSCSI\u00a0heap-overflow\u00a0vulnerability\u00a0(CVE-2025-41238)\n-------------------------------------------------------\n\n**Description:**\u00a0VMware ESXi, Workstation, and Fusion\u00a0contain a heap-overflow vulnerability in the PVSCSI (Paravirtualized SCSI) controller that leads to an out of-bounds write. Broadcom has evaluated the severity of this issue to be in the\u00a0[Critical severity range](https://www.vmware.com/support/policies/security_response.html)\u00a0with a maximum CVSSv3 base score of\u00a0[9.3](https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).\n\n**Known Attack Vectors:  \n**A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox and exploitable only with configurations that are unsupported. On Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.\n\n**Resolution:**\u00a0To remediate CVE-2025-41238 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.\n\n**Workarounds:  \n**None\n\n**Additional Documentation:  \n**A supplemental FAQ was created for clarification. Please see: [https://brcm.tech/vmsa-2025-0013-qna](https://brcm.tech/vmsa-2025-0013-qna).\n\n**Acknowledgments:**\u00a0Broadcom would like to thank Thomas Bouzerar (@MajorTomSec) and Etienne Helluy-Lafont of Synacktiv working with the Pwn2Own held by Zero day initiative for reporting this issue to us.\n\n**Notes:  \n**None.\n\n3d. vSockets information-disclosure vulnerability (CVE-2025-41239)\n------------------------------------------------------------------\n\n**Description:**\u00a0VMware ESXi, Workstation, Fusion, and VMware Tools contains\u00a0an information disclosure\u00a0vulnerability\u00a0due to the usage of an uninitialised memory in vSockets. Broadcom has evaluated the severity of this issue to be in the\u00a0[Important severity range](https://www.vmware.com/support/policies/security_response.html)\u00a0with a maximum CVSSv3 base score of\u00a0[7.1](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N).\n\n**Known Attack Vectors:  \n**A malicious actor with local administrative privileges on a virtual machine may be able to exploit this issue to leak memory from processes communicating with vSockets.\n\n**Resolution:  \n**To remediate CVE-2025-41239 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.\n\n**Workarounds:  \n**None\n\n**Additional Documentation:  \n**A supplemental FAQ was created for clarification. Please see: [https://brcm.tech/vmsa-2025-0013-qna](https://brcm.tech/vmsa-2025-0013-qna).\n\n**Acknowledgments:**\u00a0Broadcom would like to thank Corentin BAYET (@OnlyTheDuck) of REverse Tactics (@Reverse\\_Tactics) working with the Pwn2Own held by Zero day initiative and Gwangun Jung of THEORI working with Trend Micro Zero Day Initiative for independently reporting this issue to us.\n\n**Notes:  \n**\\[1\\] CVE-2025-41239 affects VMware Tools for Windows. Please check the [FAQ](https://github.com/vmware/vcf-security-and-compliance-guidelines/tree/main/security-advisories/vmsa-2025-0013#17-are-the-fixed-vmware-tools-bundled-with-esx) for additional guidance if you are running VMware Tools for Windows. \u00a0  \n\\[2\\]\u00a0VMware Tools 12.4.8 which is part of VMware Tools 12.5.3, also addresses the issue for Windows 32-bit.\n\n**Response Matrix:**\u00a0\n\n\n\n* VMware Product: VMware Cloud Foundation,VMware vSphere Foundation\n  * Component: ESX\n  * Version: 9.0.0.0\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: N/A\n  * Severity: N/A\n  * Fixed Version: Unaffected\n  * Workarounds: N/A\n  * Additional Documentation: N/A\n* VMware Product: ESX\n  * Component: 9.0.0.0\n  * Version: Any\n  * Running On: CVE-2025-41237\n  * CVE: 8.4\n  * CVSSv3: Important\n  * Severity: ESXi-9.0.0.0100-24813472\n  * Fixed Version: None\n  * Workarounds: Additional guidance for updating VMware Tools asynchronously is available in the FAQ.\n  * Additional Documentation: \n* VMware Product: VMware Tools\u00a0[1]\n  * Component: 13.0.0.0\n  * Version: Windows\n  * Running On: CVE-2025-41239\n  * CVE: 6.2\n  * CVSSv3: Moderate\n  * Severity: 13.0.1.0\n  * Fixed Version: None\n  * Workarounds: FAQ\n  * Additional Documentation: \n* VMware Product: VMware ESXi\n  * Component: N/A\n  * Version: 8.0\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 8.4, 7.4, 7.1\n  * Severity: Critical\n  * Fixed Version: ESXi80U3f-24784735\n  * Workarounds: None\n  * Additional Documentation: Additional guidance for updating VMware Tools asynchronously is available in the FAQ.\n* VMware Product: VMware ESXi\n  * Component: N/A\n  * Version: 8.0\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 8.4, 7.4, 7.1\n  * Severity: Critical\n  * Fixed Version: ESXi80U2e-24789317\n  * Workarounds: None\n  * Additional Documentation: Additional guidance for updating VMware Tools asynchronously is available in the FAQ.\n* VMware Product: VMware ESXi\n  * Component: N/A\n  * Version: 7.0\u00a0\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 8.4, 7.4, 7.1\n  * Severity: Critical\n  * Fixed Version: ESXi70U3w-24784741\n  * Workarounds: None\n  * Additional Documentation: Additional guidance for updating VMware Tools asynchronously is available in the FAQ.\n* VMware Product: VMware Workstation\n  * Component: N/A\n  * Version: 17.x\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 9.3, 9.3, 7.1\n  * Severity: Critical\n  * Fixed Version: 17.6.4\n  * Workarounds: None\n  * Additional Documentation: FAQ\n* VMware Product: VMware Fusion\n  * Component: N/A\n  * Version: 13.x\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 9.3, 9.3, 7.1\n  * Severity: Critical\n  * Fixed Version: 13.6.4\n  * Workarounds: None\n  * Additional Documentation: FAQ\n* VMware Product: VMware Cloud Foundation\u00a0\n  * Component: N/A\n  * Version: 5.x\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 8.4, 7.4, 7.1\n  * Severity: Critical\n  * Fixed Version: Async patch to\u00a0ESXi80U3f-24784735\n  * Workarounds: None\n  * Additional Documentation: Async Patching Guide: \n* VMware Product: VMware Cloud Foundation\u00a0\n  * Component: N/A\n  * Version: 4.5.x\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 8.4, 7.4, 7.1\n  * Severity: Critical\n  * Fixed Version: Async patch to\u00a0ESXi70U3w-24784741\n  * Workarounds: None\n  * Additional Documentation: Async Patching\u00a0Guide:\u00a0KB88287\n* VMware Product: VMware Telco Cloud Platform\n  * Component: N/A\n  * Version: 5.x, 4.x\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 8.4, 7.4, 7.1\n  * Severity: Critical\n  * Fixed Version: ESXi80U3f-24784735\n  * Workarounds: None\n  * Additional Documentation: FAQ\n* VMware Product: VMware Telco Cloud Platform\n  * Component: N/A\n  * Version: 3.x, 2.x\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 8.4, 7.4, 7.1\n  * Severity: Critical\n  * Fixed Version: ESXi70U3w-24784741\n  * Workarounds: None\n  * Additional Documentation: FAQ\n* VMware Product: VMware Telco Cloud Infrastructure\n  * Component: N/A\n  * Version: 3.x, 2.x\u00a0\n  * Running On: Any\n  * CVE: CVE-2025-41236, CVE-2025-41237, CVE-2025-41238, CVE-2025-41239\n  * CVSSv3: 9.3, 8.4, 7.4, 7.1\n  * Severity: Critical\n  * Fixed Version: ESXi70U3w-24784741\n  * Workarounds: \u00a0\n  * Additional Documentation: FAQ\n* VMware Product: VMware Tools\u00a0[1]\n  * Component: N/A\n  * Version: 13.x.x\n  * Running On: Windows\n  * CVE: CVE-2025-41239\n  * CVSSv3: 6.2\n  * Severity: Moderate\n  * Fixed Version: \u00a013.0.1.0\n  * Workarounds: None\n  * Additional Documentation: FAQ\n* VMware Product: VMware Tools\u00a0[1]\n  * Component: N/A\n  * Version: 12.x.x, 11.x.x\n  * Running On: Windows\n  * CVE: CVE-2025-41239\n  * CVSSv3: 6.2\n  * Severity: Moderate\n  * Fixed Version: \u00a012.5.3 [2]\n  * Workarounds: None\n  * Additional Documentation: FAQ\u00a0\n* VMware Product: VMware Tools\n  * Component: N/A\n  * Version: 13.x.x, 12.x.x, 11.x.x\n  * Running On: Linux\n  * CVE: CVE-2025-41239\n  * CVSSv3: N/A\n  * Severity: N/A\n  * Fixed Version: Unaffected\n  * Workarounds: N/A\n  * Additional Documentation: N/A\n* VMware Product: VMware Tools\n  * Component: N/A\n  * Version: 13.x.x,\u00a012.x.x, 11.x.x\n  * Running On: macOS\n  * CVE: CVE-2025-41239\n  * CVSSv3: N/A\n  * Severity: N/A\n  * Fixed Version: Unaffected\n  * Workarounds: N/A\n  * Additional Documentation: N/A\n\n\n4\\. References\n--------------\n\n**VMware Cloud Foundation 9.0.0.0.0  \n**Downloads and Documentation:  \n[https://support.broadcom.com/group/ecx/productfiles?displayGroup=VMware%20Cloud%20Foundation%209&release=9.0.0.0&os=&servicePk=&language=EN&groupId=529537&viewGroup=true](https://support.broadcom.com/group/ecx/productfiles?displayGroup=VMware%20Cloud%20Foundation%209&release=9.0.0.0&os=&servicePk=&language=EN&groupId=529537&viewGroup=true)\n\n**VMware vSphere Foundation 9.0.0.0.0**  \nDownloads and Documentation:  \n[https://support.broadcom.com/group/ecx/productfiles?displayGroup=VMware%20vSphere%20Foundation%209&release=9.0.0.0&os=&servicePk=&language=EN&groupId=529542&viewGroup=true](https://support.broadcom.com/group/ecx/productfiles?displayGroup=VMware%20vSphere%20Foundation%209&release=9.0.0.0&os=&servicePk=&language=EN&groupId=529542&viewGroup=true)\n\n**VMware ESXi\u00a08.0 ESXi80U3f-24784735  \n**Downloads and Documentation:  \n[https://support.broadcom.com/web/ecx/solutiondetails?patchId=15938](https://support.broadcom.com/web/ecx/solutiondetails?patchId=15938)  \n[https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3f-release-notes.html](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3f-release-notes.html)\n\n**VMware ESXi 8.0 ESXi80U2e-24789317  \n**Downloads and Documentation:  \n[https://support.broadcom.com/web/ecx/solutiondetails?patchId=15939](https://support.broadcom.com/web/ecx/solutiondetails?patchId=15939)  \n[https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2e-release-notes.html](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2e-release-notes.html)\n\n**VMware ESXi\u00a07.0 ESXi70U3w-24784741**  \nDownloads and Documentation:  \n[https://support.broadcom.com/web/ecx/solutiondetails?patchId=15940](https://support.broadcom.com/web/ecx/solutiondetails?patchId=15940)  \n[https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3w-release-notes.html](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3w-release-notes.html)\n\n**VMware Workstation 17.6.4  \n**Downloads and Documentation:  \n[https://support.broadcom.com/group/ecx/productdownloads?subfamily=VMware%20Workstation%20Pro&freeDownloads=true](https://support.broadcom.com/group/ecx/productdownloads?subfamily=VMware%20Workstation%20Pro&freeDownloads=true)  \n[https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/workstation-pro/17-0/release-notes/vmware-workstation-1764-pro-release-notes.html](https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/workstation-pro/17-0/release-notes/vmware-workstation-1764-pro-release-notes.html)\n\n**VMware Tools 13.0.1.0  \n**Downloads and Documentation:  \n[https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Tools&displayGroup=VMware%20Tools%2013.x&release=13.0.1.0&os=&servicePk=&language=EN&freeDownloads=true](https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Tools&displayGroup=VMware%20Tools%2013.x&release=13.0.1.0&os=&servicePk=&language=EN&freeDownloads=true)  \n[https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/tools/13-0-0/release-notes/vmware-tools-1301-release-notes.html](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/tools/13-0-0/release-notes/vmware-tools-1301-release-notes.html)\n\n**VMware Tools 12.5.3  \n**Downloads and Documentation:  \n[https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Tools&displayGroup=VMware%20Tools%2012.x&release=12.5.3&os=&servicePk=&language=EN&freeDownloads=true](https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Tools&displayGroup=VMware%20Tools%2012.x&release=12.5.3&os=&servicePk=&language=EN&freeDownloads=true)  \n[https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/tools/12-5-0/release-notes/vmware-tools-1253-release-notes.html](https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/tools/12-5-0/release-notes/vmware-tools-1253-release-notes.html)\n\n**Mitre CVE Dictionary Links:  \n**[https://www.cve.org/CVERecord?id=CVE-2025-41236](https://www.cve.org/CVERecord?id=CVE-2025-41236)\u00a0  \n[https://www.cve.org/CVERecord?id=CVE-2025-41237](https://www.cve.org/CVERecord?id=CVE-2025-41237)\u00a0  \n[https://www.cve.org/CVERecord?id=CVE-2025-41238](https://www.cve.org/CVERecord?id=CVE-2025-41238)\u00a0  \n[https://www.cve.org/CVERecord?id=CVE-2025-41239](https://www.cve.org/CVERecord?id=CVE-2025-41239)\u00a0\n\n**FIRST CVSSv3 Calculator:  \n**CVE-2025-41236:\u00a0[https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\nCVE-2025-41237:  \nESXi:\u00a0[https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)Workstation/Fusion:\u00a0[https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\nCVE-2025-41238:\u00a0  \nESXi:\u00a0[https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)Workstation/Fusion:\u00a0[https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)\n\nCVE-2025-41239:  \nESXi/Workstation/Fusion:\u00a0[https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)  \nTools: [https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N](https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)\n\n5\\. Change Log:\n---------------\n\n**2025-07-15 VMSA-2025-0013  \n**Initial security advisory.\n\n6\\. Contact:\n\nCopyright 2025 Broadcom. All rights reserved.", "creation_timestamp": "2025-07-16T12:20:29.301586+00:00", "timestamp": "2025-07-16T12:20:29.301586+00:00", "related_vulnerabilities": ["CVE-2025-41239", "CVE-2025-41236", "CVE-2025-41237", "CVE-2025-41238"], "author": {"login": "adulau", "name": "Alexandre Dulaunoy", "uuid": "c933734a-9be8-4142-889e-26e95c752803"}}
