VMware Good2know [CW22]

Newsletter

Product Release

ProductVersionRelease DateDownloadRelease Notes
vCenter Server7.0 u3 v05/20DownloadRelease Notes
ESXi 7.0 u3 v05/20DownloadRelease Notes
Skyline Health Diagnostics 4.0.905/30DownloadRelease Notes

VMware Security Advisories

VMSA-2025-0009 [HIGH]
VMware Cloud Foundation
CVSSv3
7.3 – 8.2
CVE(s)
– VMware Cloud Foundation Directory Traversal Vulnerability (CVE-2025-41229)
– VMware Cloud Foundation Information Disclosure Vulnerability  (CVE-2025-41230)
– VMware Cloud Foundation Missing Authorisation Vulnerability (CVE-2025-41231)

Description
CVE-2025-41229: VMware Cloud Foundation contains a directory traversal vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.2. A malicious actor with network access to port 443 on VMware Cloud Foundation may exploit this issue to access certain internal services. To remediate CVE-2025-41229 apply the updates listed in the ‚Fixed Version‘ column of the ‚Response Matrix‘ below to affected deployments. VMware would like to thank Gustavo Bonito of NATO Cyber Security Centre (NCSC) for reporting this issue to us.
CVE-2025-41230: VMware Cloud Foundation contains an information disclosure vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.5. A malicious actor with network access to port 443 on VMware Cloud Foundation may exploit this issue to gain access to sensitive information. To remediate CVE-2025-41230 apply the updates listed in the ‚Fixed Version‘ column of the ‚Response Matrix‘ below to affected deployments. VMware would like to thank Gustavo Bonito of NATO Cyber Security Centre (NCSC) for reporting this issue to us.
CVE-2025-41231: VMware Cloud Foundation contains a missing authorisation vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.3. A malicious actor with access to VMware Cloud Foundation appliance may be able to perform certain unauthorised actions and access limited sensitive information. To remediate CVE-2025-41231 apply the updates listed in the ‚Fixed Version‘ column of the ‚Response Matrix‘ below to affected deployments. VMware would like to thank Gustavo Bonito of NATO Cyber Security Centre (NCSC) for reporting this issue to us.
VersionCVEFixed VersionWorkaround
5.xCVE-2025-41229, CVE-2025-41230, CVE-2025-412315.2.1.2None
4.xCVE-2025-41229, CVE-2025-41230, CVE-2025-41231KB398008None

VMSA-2025-0010 [HIGH]
VMware Cloud Foundation | VMware Fusion | VMware Workstation | VMware Telco Cloud Infrastructure |
VMware Telco Cloud Platform | VMware vCenter Server | VMware vSphere ESXi
CVSSv3
4.3 – 8.8
CVE(s)
– VMware vCenter Server authenticated command-execution vulnerability (CVE-2025-41225)
– Guest Operations Denial-of-Service Vulnerability (CVE-2025-41226)
– Denial-of-Service Vulnerability (CVE-2025-41227)
– VMware ESXi and vCenter Server Reflected Cross Site Scripting (XSS) Vulnerability (CVE-2025-41228) 

Description
CVE-2025-41225: The vCenter Server contains an authenticated command-execution vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.8. A malicious actor with privileges to create or modify alarms and run script action may exploit this issue to run arbitrary commands on the vCenter Server. To remediate CVE-2025-41225 apply the updates listed in the ‚Fixed Version‘ column of the ‚Response Matrix‘ below to affected deployments. VMware would like to thank Oliver Bachtik and Bert De Bruijn for reporting this issue to us.
CVE-2025-41226: VMware ESXi contains a denial-of-service vulnerability that occurs when performing a guest operation. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 6.8. A malicious actor with guest operation privileges on a VM, who is already authenticated through vCenter Server or ESXi may trigger this issue to create a denial-of-service condition of guest VMs with VMware Tools running and guest operations enabled.To remediate CVE-2025-41226 apply the updates listed in the ‚Fixed Version‘ column of the ‚Response Matrix‘ below to affected deployments. VMware would like to thank security researcher Tom Jøran Sønstebyseter Rønning (@L1v1ng0ffTh3L4N) of Statnett (Norway) and Uros Orozel for independently reporting this issue to us.
CVE-2025-41227: VMware ESXi, Workstation, and Fusion contain a denial-of-service vulnerability due to certain guest options. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.5. A malicious actor with non-administrative privileges within a guest operating system may be able to exploit this issue by exhausting memory of the host process leading to a denial-of-service condition. To remediate CVE-2025-41227 apply the updates listed in the ‚Fixed Version‘ column of the ‚Response Matrix‘ below to affected deployments. VMware would like to thank the National Security Agency for reporting this issue to us.
CVE-2025-41228: VMware ESXi and vCenter Server contain a reflected cross-site scripting vulnerability due to improper input validation. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.3. A malicious actor with network access to the login page of certain ESXi host or vCenter Server URL paths may exploit this issue to steal cookies or redirect to malicious websites. To remediate CVE-2025-41228 apply the updates listed in the ‚Fixed Version‘ column of the ‚Response Matrix‘ below to affected deployments. VMware would like to thank Huang for reporting this issue to us.
Product (Version)CVEFixed Version
vCenter Server (8)CVE-2025-41225, CVE-2025-412288.0 U3e
vCenter Server (7)CVE-2025-412257.0 U3v
VMware ESXi (8)CVE-2025-41226, CVE-2025-41227, CVE-2025-41228ESXi80U3se-24659227
VMware ESXi (7)CVE-2025-41226, CVE-2025-41227, CVE-2025-41228ESXi70U3sv-24723868
VMware Cloud Foundation (vCenter) (5.x)CVE-2025-41225, CVE-2025-41228Async patch to 8.0 U3e
VMware Cloud Foundation (vCenter) (4.5.x)CVE-2025-41225Async patch to 7.0 U3v
VMware Cloud Foundation (ESXi) (5.x)CVE-2025-41226, CVE-2025-41227, CVE-2025-41228Async patch to ESXi80U3se-24659227
VMware Cloud Foundation (ESXi) (4.5.x)CVE-2025-41226, CVE-2025-41227, CVE-2025-41228Async patch to ESXi70U3sv-24723868
VMware Telco Cloud Platform (ESXi) (5.x, 4.x, 3.x, 2.x)CVE-2025-41226, CVE-2025-41227, CVE-2025-41228ESXi80U3se-24659227
VMware Telco Cloud Infrastructure (ESXi) (3.x)CVE-2025-41226, CVE-2025-41227, CVE-2025-41228ESXi80U3se-24659227
VMware Telco Cloud Infrastructure (ESXi) (2.x)CVE-2025-41226, CVE-2025-41227, CVE-2025-41228ESXi70U3sv-24723868
VMware Telco Cloud Platform (vCenter) (5.x, 4.x, 3.x, 2.x)CVE-2025-41225, CVE-2025-412288.0 U3e
VMware Telco Cloud Infrastructure (vCenter) (3.x)CVE-2025-412258.0 U3e
VMware Telco Cloud Infrastructure (vCenter) (2.x)CVE-2025-412257.0 U3v
VMware Workstation (17.x)CVE-2025-4122717.6.3
VMware Fusion (13.x)CVE-2025-4122713.6.3

Product Lifecycle

ProductVersionEOL
VMware Data Services Manager2.1.224.06.2025
Uhana by VMware0.52.330.06.2025
Uhana by VMware0.52.430.06.2025
Uhana by VMware0.52.530.06.2025
Uhana by VMware0.52.630.06.2025
VMware Data Services Manager2.1.316.07. 2025
VMware Kubernetes Container Clusters Plug-in4.1.118.07.2025
VMware HCX4.1027.07.2025
VMware HCX4.10.127.07.2025
VMware HCX4.10.227.07.2025
VMware HCX4.10.327.07.2025
TKr 1.29.4 for vSphere 8.x1.29.428.07.2025
VMware Integrated OpenStack7.331.07.2025
VMware vCenter Converter6.6.022.09.2025
TKr 1.30.1 for vSphere 8.x1.30.128.09.2025
TKr 1.30.8 for vSphere 8.x1.30.828.09.2025

KB Articles

KB ArticleID
ESXi hosts may PSOD during upgrade from NSX 3.2.x or 4.0.x/4.1.x to 4.2.2 due to NSX VSIP module panic.
VSAN health check failed: vSAN cluster partition when trying to patch stretched cluster to ESXI 8.0U3d399632
Data Services Manager – Upgrade to 2.2.2 from 2.2.1 fails399627
ESXi host cannot install VIBs – shows non-compliant after performing baseline/image remediation.399620
NSX manager syslog is not reporting user succesful LOGIN events399588
VM Guest Metrics Missing in Aria Operations399513
vSAN — ESXi Host vSAN Storage is down after moving vSAN Cluster to another vCenter399504
vSAN traces daemon (vsantraced service) fails with admission failure errors399290
Disruptive actions for Aria Operations for Logs cluster that could cause data loss399260
Networking not found after reboot of VIDM cluster399247
Multicast traffic between VLAN and Overlay segment through edge bridge doesn’t work.399231
Global Manager Missing from Upgrade Menu in Federation Environment399224
Upgrade vSAN Data Protection Appliance to new patches399210
Grayed out certificate cannot be removed399204
HA Event and resource utilization399125
NSX upgrade page show blank399060
The limitation of Proactive HA in 2-node vSphere HA cluster398787

Podcast | Webinar | Blog Posts

City of Fort Lauderdale – VMware Modernization Project
VMware CMTY Podcast #727
06/04
Podcast
Join us for Podcast #727 as we dive into the City of Fort Lauderdale’s VMware Modernization Project with CIO Tamecka McKay and SME & Division Manager Derek Richardson. They’ll share how they’re transforming IT infrastructure, managing large-scale modernization efforts, and overcoming challenges along the way. Plus, we’ll explore Tamecka’s VMUG journey, how community involvement has shaped careers, and her insights from VMware Explore. Don’t miss this episode packed with real-world lessons and expert insights!
The Modern VKS: Unlocking What’s Already Inside Your VKS
VCF – vSphere Kubernetes Service (VKS)
Youtube
You’ve already got the tools—now it’s time to unlock their full potential. Join VMware by Broadcom’s own Bryan Sullins for a lively, myth-busting session exploring the modern VKS. We’ll unpack what’s changed, what’s possible, and how to take advantage of features […]
Mastering Get-View: Enhance vCenter User Auditing
VCF – PowerCLI
Blogpost
If you’re already using PowerCLI, you know it’s a powerhouse for automating routine tasks. But you might not know it can unlock advanced operations. These operations are nearly impossible to achieve through the sphere UI alone. PowerCLI: More Than Meets the Eye At VMware, we […]
VMware Cloud Foundation: Don’t Forget About SSO Service Accounts
VMware Cloud Foundation – Webinar Series
Webinar
Are you still using spreadsheets to plan capacity in your Virtual infrastructure? One key requirement when delivering a modern and robust private cloud is to always ensure sufficient capacity for running the apps that grow the business. Unlike Public Clouds, private clouds do not have endless resources, so the ability to manage, monitor, and forecast capacity is critical to success.  In this session, learn how VCF Operations can support not only driving a capacity-efficient private cloud but also forecast capacity growth and, ultimately, get rid of those spreadsheets!Speaker:  Christopher Lewis. Lead Solutions Architect, VCF Specialist UK&I
Norwegian Public Roads Administration Accelerates Service Delivery and Innovation with VMware Cloud Foundation
VMware Cloud Foundation
Blogpost
Norwegian Public Roads Administration (Statens vegvesen) is the government agency responsible for national and county public roads in Norway. Its remit includes the construction and maintenance of the road network, as well as vehicle inspection, driver training and road safety. With a vision to create a more intelligent, safe and connected transportation ecosystem, the agency wanted to modernize its IT infrastructure to support innovative initiatives like intelligent transport systems and expanded public data access.

Interview: Ketil Bårdsnes (Team Leader for Central Infrastructure NPRA) – Youtube
VCF 9.0 Hardware Considerations
williamlam.com
Blogpost
It is VERY important to understand that VMware/Broadcom does NOT certify hardware and I/O devices, which is still a common miss-conception and/or FUD being thrown out in the community. Our OEM partners ultimately decide which devices to certify for each release and they may choose NOT to re-certify devices for a number of reasons including earlier end-of-sales and end-of-life support. This  is not unique to VCF 9.0 and it is not unique pre or post-acquisition of VMware.

Schreibe einen Kommentar

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert