VMware threat watch

VMware / Broadcom product CVE coverage — vSphere, ESXi, vCenter, NSX, and virtualization stack advisories.

Vendor watch hub

What this page covers

The VMwarewatch hub is a vendor-specific view inside ITECS MSP Threat Radar. We pull the latest security advisories, incidents, and known-exploited CVEs directly from the official feeds below, score each one for MSP relevance, and surface what's most likely to need attention this week.

  • Confirm whether recent VMware activity overlaps with your environment.
  • Prioritize advisories by MSP-relevance score, severity, and status.
  • Turn the signal into an assessment, briefing, or managed-service engagement with ITECS.

At a glance

Tracked

35

Active

29

Featured

30

Unique CVEs

20

Most recent entry

Apr 28, 2026, 10:16 AM

Feed refreshes daily · 5:15 a.m. Central

Sources·CISA KEV and NVD (product vendor coverage)

"Most recent entry" is the newest item the upstream feed has published — not our sync time.

Watch items

Recent VMware watch items

Showing the 20 most recent items, newest first. Each row links to the official advisory.

20 rows · sorted newest first

Operations view

spring grpc vulnerability (CVE-2026-40968)

HIGH
watchNVDCVE-2026-40968

When an authenticated user is denied access to a gRPC method, their authenticated identity remains bound to the gRPC worker thread and can be inherited by a subsequent unauthenticated request on the same thread. This may allow the subsequent user to gain escalated permissions. Affected versions: Spring gRPC: 1.0.0 - 1.0.2 (fixed in 1.0.3). Older, unsupported versions are also affected.

Apr 28, 2026, 10:16 AMOfficial source

spring boot vulnerability (CVE-2026-40975)

HIGH
watchNVDCVE-2026-40975

Values produced by ${random.value} are not suitable for use as secrets. ${random.uuid} is not affected. ${random.int} and ${random.long} should never be used for secrets as they are numeric values with a predictable range. Affected: Spring Boot 4.0.0–4.0.5 (fix 4.0.6), 3.5.0–3.5.13 (fix 3.5.14), 3.4.0–3.4.15 (fix 3.4.16), 3.3.0–3.3.18 (fix 3.3.19), 2.7.0–2.7.32 (fix 2.7.33); random value property source / weak PRNG for secrets. Versions that are no longer supported are also affected per vendor advisory.

Apr 27, 2026, 7:16 PMOfficial source

spring security vulnerability (CVE-2026-22747)

HIGH
watchNVDCVE-2026-22747

Vulnerability in Spring Spring Security. SubjectX500PrincipalExtractor does not correctly handle certain malformed X.509 certificate CN values, which can lead to reading the wrong value for the username. In a carefully crafted certificate, this can lead to an attacker impersonating another user. This issue affects Spring Security: from 7.0.0 through 7.0.4.

Apr 22, 2026, 1:16 AMOfficial source

spring boot vulnerability (CVE-2026-22733)

HIGH
watchNVDCVE-2026-22733

Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under the path used by the CloudFoundry Actuator endpoints. This issue affects Spring Security: from 4.0.0 through 4.0.3, from 3.5.0 through 3.5.11, from 3.4.0 through 3.4.14, from 3.3.0 through 3.3.17, from 2.7.0 through 2.7.31.

Mar 19, 2026, 7:16 PMOfficial source

spring boot vulnerability (CVE-2026-22731)

HIGH
watchNVDCVE-2026-22731

Spring Boot applications with Actuator can be vulnerable to an "Authentication Bypass" vulnerability when an application endpoint that requires authentication is declared under a specific path, already configured for a Health Group additional path. This issue affects Spring Boot: from 4.0 before 4.0.3, from 3.5 before 3.5.11, from 3.4 before 3.4.15. This CVE is similar but not equivalent to CVE-2026-22733, as the conditions for exploit and vulnerable versions are different.

Mar 19, 2026, 6:16 PMOfficial source

VMware ESXi and Workstation TOCTOU Race Condition Vulnerability

critical
activeCISA KEVCVE-2025-22224

VMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.

Mar 3, 2025, 6:00 PMOfficial source

VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability

critical
activeCISA KEVCVE-2025-22226

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. Successful exploitation allows an attacker with administrative privileges to a virtual machine to leak memory from the vmx process.

Mar 3, 2025, 6:00 PMOfficial source

VMware ESXi Arbitrary Write Vulnerability

critical
activeCISA KEVCVE-2025-22225

VMware ESXi contains an arbitrary write vulnerability. Successful exploitation allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox. Known ransomware use: Known.

Mar 3, 2025, 6:00 PMOfficial source

VMware vCenter Server Heap-Based Buffer Overflow Vulnerability

critical
activeCISA KEVCVE-2024-38812

VMware vCenter Server contains a heap-based buffer overflow vulnerability in the implementation of the DCERPC protocol. This vulnerability could allow an attacker with network access to the vCenter Server to execute remote code by sending a specially crafted packet.

Nov 19, 2024, 6:00 PMOfficial source

VMware vCenter Server Privilege Escalation Vulnerability

critical
activeCISA KEVCVE-2024-38813

VMware vCenter contains an improper check for dropped privileges vulnerability. This vulnerability could allow an attacker with network access to the vCenter Server to escalate privileges to root by sending a specially crafted packet.

Nov 19, 2024, 6:00 PMOfficial source

VMware ESXi Authentication Bypass Vulnerability

critical
activeCISA KEVCVE-2024-37085

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD. Known ransomware use: Known.

Jul 29, 2024, 7:00 PMOfficial source

VMware vCenter Server Incorrect Default File Permissions Vulnerability

critical
activeCISA KEVCVE-2022-22948

VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.

Jul 16, 2024, 7:00 PMOfficial source

VMware vCenter Server Out-of-Bounds Write Vulnerability

critical
activeCISA KEVCVE-2023-34048

VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution.

Jan 21, 2024, 6:00 PMOfficial source

VMware Tools Authentication Bypass Vulnerability

critical
activeCISA KEVCVE-2023-20867

VMware Tools contains an authentication bypass vulnerability in the vgauth module. A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. An attacker must have root access over ESXi to exploit this vulnerability.

Jun 22, 2023, 7:00 PMOfficial source

Vmware Aria Operations for Networks Command Injection Vulnerability

critical
activeCISA KEVCVE-2023-20887

VMware Aria Operations for Networks (formerly vRealize Network Insight) contains a command injection vulnerability that allows a malicious actor with network access to perform an attack resulting in remote code execution.

Jun 21, 2023, 7:00 PMOfficial source

VMware Tanzu Spring Cloud Function Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2022-22963

When using routing functionality in VMware Tanzu's Spring Cloud Function, it is possible for a user to provide a specially crafted SpEL as a routing-expression that may result in remote code execution and access to local resources.

Aug 24, 2022, 7:00 PMOfficial source

VMware Spring Cloud Gateway Code Injection Vulnerability

critical
activeCISA KEVCVE-2022-22947

Spring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured.

May 15, 2022, 7:00 PMOfficial source

VMware Multiple Products Privilege Escalation Vulnerability

critical
activeCISA KEVCVE-2022-22960

VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts.

Apr 14, 2022, 7:00 PMOfficial source

VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability

critical
activeCISA KEVCVE-2022-22954

VMware Workspace ONE Access and Identity Manager allow for remote code execution due to server-side template injection. Known ransomware use: Known.

Apr 13, 2022, 7:00 PMOfficial source

Spring Framework JDK 9+ Remote Code Execution Vulnerability

critical
activeCISA KEVCVE-2022-22965

Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding.

Apr 3, 2022, 7:00 PMOfficial source

Related vendors

Other cloud vendors in the radar

Vendor watch FAQ

Common questions

What is the VMware threat watch page?

It is the VMware-specific view inside ITECS Threat Radar, built to track recent advisories, incidents, and watch items that may affect Dallas-area business operations.

How should teams use the VMware watch page?

Use it to confirm whether current VMware issues overlap with your environment, prioritize remediation, and decide whether you need an assessment, managed security follow-through, or vendor-specific hardening work.

Can ITECS help respond to VMware security issues?

Yes. ITECS can help map VMware advisories against your systems, validate affected services, prioritize remediation, and connect the issue to broader managed cybersecurity or managed IT workflows.