Security

Patches

VMware plugs steal-my-credentials holes in Cloud Foundation

Consider patching soon because cybercrooks love to hit vulnerable tools from Broadcom's virtualization giant


Broadcom has fixed five flaws, collectively deemed "high severity," in VMware's IT operations and log management tools within Cloud Foundation, including two information disclosure bugs that could lead to credential leakage under certain conditions.

All five have patches available. Broadcom's security advisory doesn't note any in-the-wild exploits, yet.

We note that exploitation requires authorized access to vulnerable deployments, so if these are successfully abused in the wild, it'll most likely be through compromised or rogue accounts.

The CVEs affect Aria Operations, used for managing IT operations across different environments, and Aria Operations for Logs, which is a tool for storing and analyzing log data. Both are pieces of VMware Cloud Foundation, meaning the bugs also affect versions 4.x and 5.x of the hybrid cloud platform.

Specifically: Four of the vulnerabilities (CVE-2025-22218, CVE-2025-22219, CVE-2025-22220, and CVE-2025-22221) affect VMware Aria Operations for Logs versions 8 and newer, and one (CVE-2025-22222) affects the same versions of VMware Aria Operations. Updating both products to v8.18.3 will fix the issue. VMware Cloud Foundation users can follow KB92148 to apply the necessary fixes. 

The most severe of the bunch is CVE-2025-22218, an 8.5-rated information disclosure vulnerability in VMware Aria Operations for Logs.

"A malicious actor with View Only Admin permissions may be able to read the credentials of a VMware product integrated with VMware Aria Operations for Logs," according to the security alert.

The single bug affecting VMware Aria Operations, CVE-2025-22222, is also an information disclosure vulnerability and it received a 7.7 CVSS severity rating. 

Someone with non-admin privileges can exploit this bug and steal credentials for an outbound plugin so long as they have — or have stolen — a valid service credential ID.

The flaws fixed today in VMware Aria Operations for Logs also include two stored cross-site scripting (XSS) vulnerabilities: CVE-2025-22219 and CVE-2025-22221, which received a 6.8 and 5.2 CVSS rating, respectively.

Both can be abused to inject malicious scripts into the application, which is then executed in the victim's browser. CVE-2025-22219 doesn't require administrative privileges to exploit and may lead to arbitrary operations as an admin-level user. 

An attacker does, however, need admin privileges to abuse CVE-2025-22221. But if they do, they can inject a malicious script to be executed in a victim's browser when performing a delete action in the agent configuration.

And finally, there's a 4.3-rated privilege-escalation vulnerability, tracked as CVE-2025-22220. This one allows a user with network access to Aria Operations for Logs API to perform certain operations that would otherwise require administrative privileges.

Broadcom credited Maxime Escourbiac from Michelin CERT, and Yassine Bengana and Quentin Ebel from Abicom for spotting and disclosing the five vulnerabilities.

Both nation-state snoops and financially motivated criminals alike love exploiting VMware bugs because of the virtualization software's ubiquitous use across major enterprises and governments. Given this history as a prime target, it's perhaps a good idea to put these patches on the near-term todo list even if they are fairly heavily caveated. ®

Send us news
Post a comment

Ivanti endpoint manager can become endpoint ravager, thanks to quartet of critical flaws

PoC exploit code shows why this is a patch priority

Rackspace moving some of its own workloads off VMware to address bigger Broadcom bills

New home, Platform9, says it’s also helping a Fortune 500 company to migrate 40,000 VMs

How nice that state-of-the-art LLMs reveal their reasoning ... for miscreants to exploit

Blueprints shared for jail-breaking models that expose their chain-of-thought process

US Cyber Command reportedly pauses cyberattacks on Russia

PLUS: Phishing suspects used fishing gear as alibi; Apple's 'Find My' can track PCs and Androids; and more

Qualcomm pledges 8 years of security updates for Android kit using its chips (YMMV)

Starting with Snapdragon 8 Elite and 'droid 15

Talk of Broadcom and TSMC grabbing pieces of Intel lights fire under investors

Chipzilla's design and manufacturing limbs said to be on the table

Drug-screening biz DISA took a year to disclose security breach affecting millions

If there's something nasty on your employment record, extortion scum could come calling

Microsoft expands Copilot bug bounty targets, adds payouts for even moderate messes

Said bugs 'can have significant implications' – glad to hear that from Redmond

Broadcom reportedly investigates acquiring Intel’s chip design biz

Shhh. Don’t tell Hock Tan about those Xeons that unlock functions when you pay a fee

C++ creator calls for help to defend programming language from 'serious attacks'

Bjarne Stroustrup wants standards body to respond to memory-safety push as Rust monsters lurk at the door

Malware variants that target operational tech systems are very rare – but 2 were found last year

Fuxnet and FrostyGoop were both used in the Russia-Ukraine war

Check out this free automated tool that hunts for exposed AWS secrets in public repos

You can find out if your GitHub codebase is leaking keys ... but so can miscreants