PT-2025-9651 · Vmware · Vmware Esxi+1
Published
2025-03-04
·
Updated
2026-03-06
·
CVE-2025-22224
CVSS v3.1
9.3
9.3
Critical
| Base vector | Vector | AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
VMware ESXi and Workstation versions prior to patch availability
VMware Fusion versions prior to patch availability
Description
VMware ESXi, Workstation, and Fusion contain a Time-of-Check Time-of-Use (TOCTOU) vulnerability that results in an out-of-bounds write condition. An attacker with local administrative privileges on a virtual machine can exploit this issue to execute code as the virtual machine's VMX process running on the host. This vulnerability is actively exploited in the wild by multiple threat actors, including APT29, APT41, and APT28. Reports indicate that the exploit toolkit used in these attacks may have been developed as early as February 2024. The vulnerability allows attackers to escape the virtual machine and potentially compromise the hypervisor. Over 41,500 internet-exposed VMware ESXi instances are currently vulnerable. The exploitation of this vulnerability has been linked to initial access through compromised SonicWall VPNs and subsequent deployment of malicious toolkits like MAESTRO and VSOCKpuppet. These toolkits enable stealthy communication and evasion of network monitoring.
The vulnerability is related to the VMCI (Virtual Machine Communications Interface) and can lead to a VM escape, granting attackers control over the ESXi host. The
VMX process is specifically targeted during exploitation.Recommendations
Apply the latest security patches released by VMware for ESXi, Workstation, and Fusion as soon as possible.
Restrict access to the vulnerable module
VMX to minimize the risk of exploitation.
Consider temporarily disabling the VMCI if it is not essential for your environment.
If possible, restrict local administrative privileges on virtual machines.Fix
RCE
LPE
Race Condition
Time Of Check To Time Of Use
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
BDU:2025-02354
CVE-2025-22224
Affected Products
Vmware Esxi
Vmware Workstation
References · 212
- https://nvd.nist.gov/vuln/detail/CVE-2025-22224 · Security Note
- https://bdu.fstec.ru/vul/2025-02354 · Security Note
- https://reddit.com/r/CVEWatch/comments/1m18qqc/top_10_trending_cves_16072025 · Reddit Post
- https://twitter.com/f1tym1/status/1897595316498538620 · Twitter Post
- https://twitter.com/transilienceai/status/1898342223269302439 · Twitter Post
- https://reddit.com/r/vmware/comments/1j3bhti/carbon_black_vs_zerolock_best_esxi_protection_on · Reddit Post
- https://twitter.com/transilienceai/status/1901785144975143017 · Twitter Post
- https://twitter.com/AbubakarMundir/status/1897930657348698135 · Twitter Post
- https://twitter.com/VulmonFeeds/status/1896916814040318398 · Twitter Post
- https://twitter.com/0x534c/status/1897853992883175932 · Twitter Post
- https://twitter.com/vuldb/status/1896908253734531269 · Twitter Post
- https://reddit.com/r/Dell/comments/1jcz2c2/poweredge_r640_no_custom_dell_iso_update_yet · Reddit Post
- https://t.me/pentestingnews/57363 · Telegram Post
- https://twitter.com/transilienceai/status/1898887578998481311 · Twitter Post
- https://twitter.com/cybersec4/status/1897589935814685016 · Twitter Post