κατασκευή ιστοσελίδων ρόδος

TECH - WEB DEVELOPMENT NEWS

Get the latest tech - web development news and analysis on industry around the world.

  • HOME
You are here: Home / INDUSTRY NEWS / 17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability
άμυνα
.

17,000+ VMware ESXi Servers Vulnerable to Critical Integer-Overflow Vulnerability

12/08/2025

More than 17,000 VMware ESXi installations worldwide are at risk from a severe integer-overflow vulnerability tracked as CVE-2025-41236 (CVSS 9.3), cybersecurity researchers warn.

This critical vulnerability, first flagged in July, has prompted urgent calls for patching, but the latest scan results suggest progress remains slow, with thousands of systems still unpatched.

Shadowserver Foundation, in partnership with the UK Government, incorporated targeted detection for CVE-2025-41236 into its daily global scan on July 19, 2025.

The inaugural scan identified a staggering 17,238 unique IPs running vulnerable versions of ESXi, a popular virtualization platform used in enterprise environments.

By August 10, the number of unpatched servers had only marginally decreased to 16,330, underscoring an alarmingly slow pace of remediation despite open warnings and the critical nature of this threat.

VMware ESXi Vulnerability – CVE-2025-41236

The geographical distribution of exposed systems highlights the scale of the challenge. France, China, the United States, and Germany top the list of most affected countries, each hosting hundreds or thousands of vulnerable ESXi instances.

Exposed Servers

Other regions with significant exposure include Russia, the Netherlands, and Brazil. The situation presents heightened risk for businesses, governments, and cloud service providers relying on ESXi for virtualization.

Attackers able to exploit this vulnerability could gain control over core infrastructure, potentially disrupting critical systems at scale.

CVE-2025-41236 is an integer-overflow bug in VMware ESXi’s HTTP management interface. Rated 9.3 out of 10 on the CVSS scale, it permits unauthenticated remote attackers to execute arbitrary code, escalate privileges, or deliver ransomware inside virtual environments.

Researchers say exploitation is trivial and could enable attackers to pivot across entire data centers. The vulnerability affects ESXi 7.x and some 8.x builds, with exploits reportedly circulating in underground forums since late July.

Security teams have responded slowly, as reflected in the numbers: Shadowserver’s scans over three weeks show a reduction of less than 1,000 vulnerable instances, barely 5% of those at risk. Experts attribute sluggish patching to complex upgrade processes, downtime concerns, and poor awareness.

Many exposed ESXi hosts are directly accessible from the internet, compounding risk and inviting mass exploitation campaigns.

  • Patch Immediately: Organizations running unpatched ESXi versions must deploy VMware’s official security updates without delay.
  • Check Exposure: Use public scanning tools or vendor advisories to check whether your environments are exposed.
  • Restrict Access: Limit internet-facing management interfaces and enforce strong authentication policies.

The continued existence of thousands of internet-exposed, unpatched ESXi servers signals an urgent need for improved security hygiene and accelerated vulnerability management efforts. With global cybercriminals actively seeking to exploit CVE-2025-41236, time is of the essence.

Boost your SOC and help your team protect your business with free top-notch threat intelligence: Request TI Lookup Premium Trial.

    Source: cybersecuritynews.com

    Filed Under: INDUSTRY NEWS Tagged With: Source-10

    3 reasons I switched to and prefer OpenCloud instead of Nextcloud

    For years, Nextcloud was my default self-hosted cloud solution. It promised freedom and control, but over time, I ran into several issues: sluggish performance, bloated experience, and an endless stream of minor bugs. I felt stuck in a trade-off between control and usability – until I finally made the leap to OpenCloud. Source: xda-developers.com … [Read More...]

    The best advent calendars for 2025: Our top picks from Lego, Pokémon, Funko Pop and more

    Who needs ornaments when you can deck the halls with Star Wars builds? This advent calendar delivers 24 surprises, ranging from tiny ships to minifigures in festive outfits. That means you might spot Darth Vader in a scarf or R2-D2 with some seasonal flair. It’s an easy way to make the holidays feel like a Star Wars marathon on Disney+, with new pieces to add to your desk or display shelf every … [Read More...]

    Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks

    With the release of Kali Linux 2025.3, a major update introduces an innovative tool that combines artificial intelligence and cybersecurity: the Gemini Command-Line Interface (CLI). This new open-source package integrates Google’s powerful Gemini AI directly into the terminal, offering penetration testers and security professionals an intelligent assistant designed to streamline and automate … [Read More...]

    OxygenOS 16 Launch Date Confirmed; New OnePlus AI Features Expected to Debut With OnePlus 15

    OxygenOS 16 will be launched by OnePlus on October 16 in India, the Chinese smartphone maker announced. The new user interface will be built on top of Android 16. It will bring several new redesigned elements to OnePlus handsets, along with a suite of artificial intelligence (AI)-powered features. The upcoming OnePlus 15, the company's next flagship handset, might run OxygenOS 16 out of the box, … [Read More...]

    Bitcoin Price Drops to $124,000 After Hitting New All-Time High

    The global crypto market opened Monday on a bullish note, as Bitcoin consolidated gains after hitting a new all-time high over the weekend. The world's most widely used digital asset briefly surged past the $125,500 (roughly Rs. 1.1 crore) mark, before dropping to around $124,000 (roughly Rs. 1.1 crore). Ethereum also held strong above $4,500 (roughly Rs. 3.99 lakh), reflecting the momentum that … [Read More...]

    Beer Giant Asahi Says Data Stolen in Ransomware Attack

    Japanese brewing giant Asahi Group Holdings has confirmed that a ransomware attack has caused the week-long outage at its domestic subsidiaries. The company disclosed the incident last week, blaming order and shipment operational disruptions, and call center downtime on a cyberattack that resulted in system failures. The company, which suspended production at some of its factories in Japan, … [Read More...]

    PoC Exploit Released for Sudo Vulnerability that Enables Attackers to Gain Root Access

    A publicly available proof-of-concept (PoC) exploit has been released for CVE-2025-32463, a local privilege escalation (LPE) flaw in the Sudo utility that can grant root access under specific configurations.  Security researcher Rich Mirch is credited with identifying the weakness, while a functional PoC and usage guide have been published in an open GitHub repository, accelerating the … [Read More...]

    Oracle E-Business Suite Zero-Day Exploited in Cl0p Attacks

    The recent data theft and extortion campaign targeting Oracle E-Business Suite customers has been confirmed to be the work of the notorious Cl0p ransomware group, and Oracle has admitted that the hackers have exploited a zero-day vulnerability. The attacks targeting Oracle E-Business Suite (EBS) customers came to light last week, when Google Threat Intelligence Group (GTIG) and Mandiant warned … [Read More...]

    Realme GT 8 Pro Spotted in Hands-On Image; Said to Feature 200-Megapixel Telephoto Camera

    Realme GT 8 Pro is set to launch in China in October alongside the standard Realme GT 8. The company has teased some key details of the upcoming smartphones. The company previously revealed that the Realme GT 8 Pro variant will feature a swappable rear camera module. A recently leaked live image showcases one of the three designs of the purported interchangeable camera island. A senior company … [Read More...]

    Redis Server Vulnerability use-after-free Vulnerability Enables Remote Code Execution

    A critical use-after-free vulnerability, identified as CVE-2025-49844, has been discovered in Redis servers, enabling authenticated attackers to achieve remote code execution. This high-severity flaw affects all versions of Redis that utilize the Lua scripting engine, presenting a significant threat to a wide range of deployments that rely on the popular in-memory data store. The core of … [Read More...]

    Tags

    Source-1 Source-2 Source-3 Source-4 Source-5 Source-6 Source-7 Source-8 Source-9 Source-10 Source-12 Source-13 Source-15 Source-16

    Tech Web Development News

    This is a PERSONAL and PRIVATE WEBPAGE. Please leave this page. Contact me via email : admin@news-6.com about anything you would like to ask or problem.

    Tech News

    Disclaimer!
    In every post is written below the original source of the post. Copyrights belong on their owners.

    Web Development News

    HOTELS – CRUISES – CARS – TRAVEL

    Recent Posts

    • 3 reasons I switched to and prefer OpenCloud instead of Nextcloud
    • The best advent calendars for 2025: Our top picks from Lego, Pokémon, Funko Pop and more
    • Gemini CLI to Your Kali Linux Terminal To Automate Penetration Testing Tasks
    • OxygenOS 16 Launch Date Confirmed; New OnePlus AI Features Expected to Debut With OnePlus 15
    • Bitcoin Price Drops to $124,000 After Hitting New All-Time High

    Technology - Seo

    Categories

    • INDUSTRY NEWS

    World Industry News

    Privacy & Cookies: This site uses cookies.
    To find out more, as well as how to remove or block these, see here: Our Cookie Policy
    TECH - WEB DEVELOPMENT NEWS @ COPYRIGHTS 2023