Broadcom Finally Patches Dangerous VMware Zero-Day Exploited by Chinese Hackers
The China-linked UNC5174 group exploited a VMware local privilege escalation bug since October 2024, rated high severity with a CVSS score of 7.8, enabling root code execution.
7 Articles
7 Articles


Broadcom finally patches dangerous VMware zero-day exploited by Chinese hackers
A bug abused since late 2024 has now finally been addressed.
VMware Vulnerability CVE-2025-41244 Exploited For A Year
A newly listed VMware zero-day vulnerability has been actively exploited by Chinese state-sponsored threat actors for almost a year, according to security researchers. The vulnerability, CVE-2025-41244, was reported to VMware parent Broadcom by NVISO researchers, who published a blog on September 29 detailing the in-the-wild exploitation. Broadcom also addressed the vulnerability in an advisory published the same day. The 7.8-rated local privile…
China-Linked Hackers Exploit New VMware Zero-Day Since October 2024 - Cybernoz - Cybersecurity News
Sep 30, 2025Ravie LakshmananZero-Day / Vulnerability A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a threat actor called UNC5174, according to NVISO Labs. The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), a local privilege escalation bug affecting the following versions – VMware Cloud Foundation 4.x and 5.x VMwar…
Urgent: China-Linked Hackers Exploit New VMware Zero-Day Since October 2024
A newly patched security flaw impacting Broadcom VMware Tools and VMware Aria Operations has been exploited in the wild as a zero-day since mid-October 2024 by a threat actor called UNC5174, according to NVISO Labs. The vulnerability in question is CVE-2025-41244 (CVSS score: 7.8), a local privilege escalation bug affecting the following versions VMware Cloud Foundation 4.x and 5.x VMware
Coverage Details
Bias Distribution
- 100% of the sources are Center
Factuality
To view factuality data please Upgrade to Premium