12 Nisan 2026
  • Advisory ID: VMSA-2025-0016
  • CVSSv3 Range: 7.5-8.5
  • Issue Date: 29 Eylül 2025
  • Updated On: 29 Eylül 2025
    • CVE-2025-41250, CVE-2025-41251, CVE-2025-41252
    • VMware vCenter ve NSX’te tespit edilen birden fazla güvenlik açığı için güncellemeler yayınlanmıştır. Bu açıklar CVE-2025-41250, CVE-2025-41251 ve CVE-2025-41252 kodlarıyla tanımlanmaktadır.

VMSA-2025-0010’da Etkilenen Ürünler

  • VMware NSX
  • NSX-T
  • VMware Cloud Foundation
  • VMware vCenter Server
  • VMware Telco Cloud Platform
  • VMware Telco Cloud Infrastructure

Giriş

VMware vCenter ve NSX’teki çok sayıda güvenlik açığı Broadcom’a özel olarak bildirilmiştir. Etkilenen Broadcom ürünlerinde bu güvenlik açıklarını gidermek için güncellemeler mevcuttur.

1. VMSA-2025-0016CVE-2025-41250 – vCenter SMTP Header Injection Açığı

Etkilenen Ürün: VMware vCenter Server

Önem Derecesi: Yüksek (CVSSv3: 8.5)

Açıklama: VMware vCenter’da SMTP başlık enjeksiyonu açığı bulunmaktadır. Support Content Notification – Support Portal – Broadcom support portal

Saldırı Vektörü: vCenter’da zamanlanmış görevler oluşturma yetkisine sahip, yönetici olmayan yetkilerle kötü niyetli bir saldırgan, zamanlanmış görevler için gönderilen bildirim e-postalarını manipüle edebilir. Support Content Notification – Support Portal – Broadcom support portal

Response Matrix: 

VMware ProductComponentVersionRunning OnCVECVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware Cloud Foundation,VMware vSphere FoundationvCenter9.x.x.xAnyCVE-2025-412508.5Important9.0.1.0NoneNone
VMware vCenterN/A8.0AnyCVE-2025-412508.5Important8.0 U3gNoneNone
VMware vCenterN/A7.0AnyCVE-2025-412508.5Important7.0 U3w None
VMware Cloud Foundation vCenter5.xAnyCVE-2025-412508.5Important5.2.2NoneAsync Patching Guide: KB88287
VMware Cloud Foundation vCenter4.5.xAnyCVE-2025-412508.5ImportantAsync patch to 7.0 U3wNoneAsync Patching Guide: KB88287
VMware Telco Cloud PlatformvCenter5.x, 4.x, 3.x, 2.xAnyCVE-2025-412508.5ImportantKB411508NoneNone
VMware Telco Cloud InfrastructurevCenter3.x, 2.xAnyCVE-2025-412508.5ImportantKB411508NoneNone

2. VMSA-2025-0016CVE-2025-41251 – NSX Zayıf Şifre Kurtarma Mekanizması

Etkilenen Ürün: VMware NSX

Önem Derecesi: Yüksek (CVSSv3: 8.1)

Açıklama: VMware NSX’te zayıf şifre kurtarma mekanizması açığı bulunmaktadır. Support Content Notification – Support Portal – Broadcom support portal

Saldırı Vektörü: Kimlik doğrulaması yapılmamış kötü niyetli bir saldırgan, bu açığı kullanarak geçerli kullanıcı adlarını numaralandırabilir ve bu da potansiyel olarak brute-force saldırılarına yol açabilir. Support Content Notification – Support Portal – Broadcom support portal

3. VMSA-2025-0016CVE-2025-41252 – NSX Kullanıcı Adı Numaralandırma Açığı

Etkilenen Ürün: VMware NSX

Önem Derecesi: Yüksek (CVSSv3: 7.5)

Açıklama: VMware NSX’te kullanıcı adı numaralandırma açığı bulunmaktadır. Support Content Notification – Support Portal – Broadcom support portal

Saldırı Vektörü: Kimlik doğrulaması yapılmamış saldırgan, sistemdeki geçerli kullanıcı adlarını tespit edebilir.

Response Matrix:

VMware ProductComponentVersionRunning OnCVECVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware Cloud Foundation,VMware vSphere FoundationVMware NSX9.x.x.xAnyCVE-2025-41251, CVE-2025-41252 8.17.5Important9.0.1.0NoneNone
VMware NSXN/A4.2.xAnyCVE-2025-41251, CVE-2025-41252 8.1, 7.5Important4.2.2.2, 4.2.3.1NoneNone
VMware NSXN/A4.1.x, 4.0.xAnyCVE-2025-41251, CVE-2025-41252 8.17.5Important4.1.2.7NoneNone
NSX-TN/A3.xAnyCVE-2025-41251, CVE-2025-41252 8.17.5Important3.2.4.3NoneNone
VMware Cloud Foundation VMware NSX5.xAnyCVE-2025-41251, CVE-2025-41252 8.17.5ImportantKB88287NoneAsync Patching Guide: KB88287
VMware Cloud Foundation VMware NSX4.5.xAnyCVE-2025-41251, CVE-2025-41252 8.17.5ImportantKB88287NoneAsync Patching Guide: KB88287
VMware Telco Cloud InfrastructureVMware NSX3.x, 2.x AnyCVE-2025-41251, CVE-2025-41252 8.17.5ImportantKB411518NoneNone
VMware Telco Cloud PlatformVMware NSX5.x, 4.x, 3.xAnyCVE-2025-41251, CVE-2025-41252 8.17.5ImportantKB411518NoneNone

VMSA-2025-0015 Referans Linkler

Düzeltilen Sürüm(ler) ve Sürüm Notları:

VMware Cloud Foundation 9.0.1.0:
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?displayGroup=VMware%20Cloud%20Foundation%209&release=9.0.1.0&os=&servicePk=534266&language=EN&groupId=534225&viewGroup=true

VMware vSphere Foundation 9.0.1.0:
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?displayGroup=VMware%20vSphere%20Foundation%209&release=9.0.1.0&os=&servicePk=534207&language=EN&groupId=534225&viewGroup=true

VMware Cloud Foundation 5.2.2
Downloads and Documentation:
https://techdocs.broadcom.com/us/en/vmware-cis/vcf/vcf-5-2-and-earlier/5-2/vcf-release-notes/vmware-cloud-foundation-522-release-notes.html

VMware vCenter 8.0 U3g
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=15964
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/vcenter-server-update-and-patch-release-notes/vsphere-vcenter-server-80u3g-release-notes.html

VMware vCenter 7.0 U3w
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=15986
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/vcenter-server-update-and-patch-releases/vsphere-vcenter-server-70u3w-release-notes.html

VMware NSX 4.2.3.1
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20NSX&displayGroup=VMware%20NSX&release=4.2.3.1&os=&servicePk=&language=EN
https://techdocs.broadcom.com/us/en/vmware-cis/nsx/vmware-nsx/4-2/release-notes/vmware-nsx-4231-release-notes.html

VMware NSX 4.2.2.2
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20NSX&displayGroup=VMware%20NSX&release=4.2.2.2&os=&servicePk=&language=EN
https://techdocs.broadcom.com/us/en/vmware-cis/nsx/vmware-nsx/4-2/release-notes/vmware-nsx-4222-release-notes.html

VMware NSX 4.1.2.7
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20NSX&displayGroup=VMware%20NSX&release=4.1.2.7&os=&servicePk=&language=EN
https://techdocs.broadcom.com/us/en/vmware-cis/nsx/vmware-nsx/4-1/release-notes/vmware-nsx-4127-release-notes.html

VMware NSX-T 3.2.4.3
Downloads and Documentation
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20NSX-T%20Data%20Center&displayGroup=VMware%20NSX-T%20Data%20Center&release=3.2.4.3&os=&servicePk=&language=EN
https://techdocs.broadcom.com/us/en/vmware-cis/nsx/nsxt-dc/3-2/release-notes/vmware-nsxt-data-center-3243-release-notes.html

Mitre CVE Dictionary Links:
https://www.cve.org/CVERecord?id=CVE-2025-41250
https://www.cve.org/CVERecord?id=CVE-2025-41251
https://www.cve.org/CVERecord?id=CVE-2025-41252

FIRST CVSSv3 Calculator:
CVE-2025-41250: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:L
CVE-2025-41251: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2025-41252: https://www.first.org/cvss/calculator/3-1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Son yazılar için;

VMSA-2025-0015: VMware Aria Operations ve Tools Kritik Güvenlik Açığı Analizi

VMSA-2025-0010: VMware ESXi ve vCenter Server’da Tespit Edilen Güvenlik Açıkları

CVE-2025-22249: VMware Aria Automation’daki XSS Açığı VMSA-2025-0008

VMware Tools CVE-2025-22247 Açığı: Sanal Makinelerde Dosya Manipülasyonu Riski VMSA-2025-0007

VMware vCenter Build Numbers ve Versions 8 & 7 & 6

VMSA-2025-0006 VMware Aria Operations’ta Yerel Ayrıcalık Yükseltme Açığı (CVE-2025-22231) ve Çözüm Yolları​

VMSA-2025-0005 VMware Tools for Windows’ta Kritik Kimlik Doğrulama Açığı (CVE-2025-22230)​

VMSA-2025-0004 – VMware Ürünlerinde Kritik Güvenlik Açıkları: CVE-2025-22224, CVE-2025-22225 ve CVE-2025-22226

VMSA-2025-0002 VMware Avi Load Balancer’da Kimlik Doğrulaması Olmayan Blind SQL Enjeksiyonu Güvenlik Açığı (CVE-2025-22217)

vCSA Root (vCenter Server Appliance) Şifresi Nasıl Sıfırlanır?

Sistem Güncellemeleri: Canberk’in 2024 Yama Notları

vExpert 2025 Başvuruları Başladı!

Expert System Engineer @Odeabank

Leave A Reply

Exit mobile version