Site icon TheCyberThrone

VMware Tools VGAuth Vulnerabilities

Advertisements

Overview:
Two critical local privilege escalation vulnerabilities were recently discovered in the VGAuth service component of VMware Tools for Windows virtual machines (VMs). These are tracked as:

Both issues allow attackers with low privileges inside a Windows guest VM to escalate their access to SYSTEM level, the highest level of privilege on Windows, which could lead to complete control of the affected VM.

Vulnerability #1: CVE-2025-22230

Technical Details:

  1. Attacker guesses the pipe name VGAuth will use (due to predictable naming).
  2. Creates a malicious pipe before VGAuth does.
  3. When VGAuth attempts SYSTEM-level operations using the pipe, it connects to the attacker’s pipe.
  4. The attacker’s process now executes actions as SYSTEM.

Vulnerability #2: CVE-2025-22247

Technical Details:

Other Relevant VGAuth Vulnerabilities

CVE-2023-20867

CVE-2022-22977

Mitigation Guidance

Security Best Practices

Exploitation Evidence

CVE-2025-22230 and CVE-2025-22247 (2025)

CVE-2023-20867 (2023)

Exit mobile version