Broadcom has patched a high-severity VMware vulnerability (CVE-2025-41244, CVSS 7.8) that had been exploited as a zero-day for nearly a year. The flaw, impacting VMware Aria Operations and VMware Tools (including open-vm-tools on Linux), allows privilege escalation to root on VMs. Security researchers at NVISO Labs reported that a Chinese state-sponsored threat group, UNC5174, has been actively exploiting the bug, including by staging malicious binaries in writable directories like /tmp/httpd. Patches are now available across VMware Cloud Foundation, vSphere, Aria Operations, Telco Cloud Platform, VMware Tools, and open-vm-tools (to be distributed by Linux vendors). Detection requires monitoring for uncommon child processes or leftover collector scripts.
You can find more details here: https://blog.nviso.eu/2025/09/29/you-name-it-vmware-elevates-it-cve-2025-41244/
Gunter Ollmann, CTO, Cobalt had this comment:
“Zero-days that persist in widely used infrastructure for nearly a year highlight the growing mismatch between vendor disclosures and adversary realities. In this case, the triviality of the exploit means it likely fell into the hands of multiple threat actors, not just those with nation-state capabilities. When exploitation is both simple and widespread, leaving customers unaware is an unforced error that adds unnecessary risk. The industry needs more candor around zero-day exploitation so defenders can calibrate their urgency. In the long run, trust in security advisories will matter as much as the patches themselves.”
Dale Hoak, CISO, RegScale adds this:
“An unpatched or undisclosed zero-day undermines the very foundation of compliance programs, which rely on accurate risk data. If customers don’t know an exploit is active, they can’t prioritize remediation, leaving regulators and auditors working from a false baseline of assurance. This is why it’s critical to operationalize risk in the larger context of patching—moving beyond a checklist exercise to a process that connects advisories, vulnerability data, and remediation actions in real time. Continuous controls monitoring enables that connection, ensuring that controls are validated against live threats, not just documented in static reports. Real assurance comes when organizations can align compliance, risk, and patching as a single operational discipline.”
While I am a big believer in patching all the things, you also have to have an approach to security that mitigates the potential effects of zero days. That’s not easy to do, but it has become a requirement given how quickly threat actors evolve and shift tactics.
I should also mention that the fact that this was out there for a year is bad. Extraordinarily bad. But you knew that already.
UPDATE: Adrian Culley, Senior Sales Engineer at SafeBreach adds this comment:
“Broadcom has released fixes for CVE-2025-41244 and related issues affecting VMware Aria Operations and VMware Tools. In certain configurations, VMs with VMware Tools managed by Aria Operations with SDMP enabled local privilege escalation to root. NVISO reports the bug was exploited in the wild since mid-October 2024 by a China-nexus actor assessed as UNC5174. Teams should patch Aria Operations/Tools immediately and ensure Linux hosts receive updated open-vm-tools from their distributors. Hunt for exploitation by looking for mimicked system binaries (e.g., httpd) in writable paths like /tmp/httpd and for unusual child processes from discovery collectors. After patching, continuously validate that privilege-escalation, credential harvesting, and lateral-movement paths are closed—don’t just assume they are.”
Major Retailers, Gift Card Networks, and Law Enforcement Unite for 2025 Holiday Gift Card Fraud Awareness Campaign
Posted in Commentary with tags fraud, FTC on October 1, 2025 by itnerdAs the 2025 holiday shopping season approaches, an alliance of leading retailers, card networks, and law enforcement agencies is launching a nationwide social media campaign to combat the alarming surge in gift card fraud. The campaign, led by the Gift Card Fraud Prevention Alliance (GCFPA), aims to educate, empower, and protect consumers during the busiest shopping time of the year.
From October 1 through December 25, holiday shoppers will see daily tips and information on the latest scams on LinkedIn and Instagram platforms, spotlighting the tactics scammers use and steps every consumer can take to avoid falling victim. This collaborative effort marks a landmark partnership among industry giants, national and state retail associations, and public safety organizations, all dedicated to protecting the public from gift card-related crimes.
Gift Card Fraud on the Rise: A United Response
According to recent reports, gift card fraud costs consumers millions of dollars annually, with incidents peaking during the holiday season. Scammers frequently target unsuspecting shoppers, tricking them into purchasing gift cards as payment for a fake debt or tampering with cards in stores and draining card funds as soon as the cards are purchased.
Recognizing the urgent need for greater awareness, retailers—including national chain stores, grocery outlets, and specialty merchants—are joining forces with major gift card networks, state retail associations, and local, state, and federal law enforcement agencies to spread vital information.
Empowering Shoppers with Knowledge and Action
The campaign’s social media posts will focus on these essential warnings:
By sharing clear, actionable guidance and real-world examples, partner organizations hope to reduce fraud and ensure shoppers enjoy a safe, stress-free and joy-filled holiday season.
A Shared Commitment to Consumer Protection
This collaborative campaign represents a shared commitment by retailers, gift card issuers, and law enforcement to stand together against fraud. Gift card fraud isn’t just a small-time scam—it’s often the work of organized retail crime rings. These groups use sophisticated tactics to target consumers. The GCFPA is working with a diverse group of stakeholders to keep gift cards safe.
How to Get Involved
Consumers are encouraged to follow the RILA Communities Foundation on LinkedIn and @ProtectMyGiftCard on Instagram for daily tips and updates throughout the campaign. For more information or to report a scam, contact local law enforcement, state attorney general’s offices, or visit the Federal Trade Commission’s website.
Leave a comment »