PT-2025-9652 · Vmware · Vmware Esxi

Published

2025-03-04

·

Updated

2026-03-07

·

CVE-2025-22225

CVSS v3.1
8.2
VectorAV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions VMware ESXi (affected versions not specified)
Description VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the
VMX
process may trigger an arbitrary kernel write, leading to an escape of the sandbox. This vulnerability is actively being exploited in the wild by ransomware groups. Reports indicate that attackers are leveraging this flaw to gain code execution on the host, potentially impacting multiple virtual machines. The exploit toolkit used by attackers leverages
HGFS
(Host-Guest File System) for data exfiltration,
VMCI
(Virtual Machine Communication Interface) for memory corruption, and kernel-level shellcode to escalate privileges. There have been confirmed reports of exploitation, and CISA has added this vulnerability to its KEV catalog. The vulnerability allows attackers to escape the virtual machine's sandbox and gain unrestricted access to host systems.
Recommendations Apply the latest security updates from Broadcom for VMware ESXi. Verify the current version of ESXi in use and follow VMware’s official guidance to deploy the fix immediately. Implement network segmentation to isolate ESXi hosts from critical systems. Restrict access to the
VMX
process using role-based access controls. Regularly audit virtual machine configurations and monitor for anomalous behavior, such as unexpected process creation or unusual outbound traffic.

Fix

LPE

Memory Corruption

Weakness Enumeration

Related Identifiers

BDU:2025-02379
CVE-2025-22225

Affected Products

Vmware Esxi