VMware ESXi Guest Operation Denial-of-Service via VMware Tools
CVE-2025-41226 Published on May 20, 2025

Guest Operations Denial-of-Service Vulnerability
VMware ESXi contains a denial-of-service vulnerability that occurs when performing a guest operation. A malicious actor with guest operation privileges on a VM, who is already authenticated through vCenter Server or ESXi may trigger this issue to create a denial-of-service condition of guest VMs with VMware Tools running and guest operations enabled.

NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
CHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

What is a Resource Exhaustion Vulnerability?

The software does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources.

CVE-2025-41226 has been classified to as a Resource Exhaustion vulnerability or weakness.


Products Associated with CVE-2025-41226

Want to know whenever a new CVE is published for VMware ESXi? stack.watch will email you.

 

Affected Versions

VMware ESXi: VMware Cloud Foundation: VMware Telco Cloud Platform: VMware Telco Cloud Infrastructure:

Exploit Probability

EPSS
0.05%
Percentile
14.58%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.