PT-2025-9653 · Vmware · Vmware Fusion+2
Published
2025-03-04
·
Updated
2026-02-05
·
CVE-2025-22226
CVSS v3.1
7.1
7.1
High
| Base vector | Vector | AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N |
Name of the Vulnerable Software and Affected Versions
VMware ESXi
VMware Workstation
VMware Fusion
VMware Cloud Foundation
VMware Telco Cloud Platform
VMware Telco Cloud Infrastructure
versions prior to 8.0
Description
The software contains an information disclosure issue due to an out-of-bounds read within the Host Guest File System (HGFS). A malicious actor with administrative privileges on a virtual machine may be able to exploit this to leak memory from the
vmx process. This could lead to unauthorized access to protected information. The issue is actively exploited in the wild, with reports of attackers using the MAESTRO toolkit and VSOCKpuppet backdoor to escape virtual machines and gain control of the host system. The campaign often begins with a compromised edge device, such as a VPN, and can escalate to full hypervisor control, potentially for ransomware deployment and widespread disruption. The vulnerability has been exploited by Chinese-speaking hackers via SonicWall VPN, prior to public disclosure.Recommendations
For VMware ESXi, Workstation, and Fusion versions prior to 8.0, update to a newer version to address this vulnerability.
Fix
Out of bounds Read
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2025-02375
CVE-2025-22226
Affected Products
Vmware Esxi
Vmware Fusion
Vmware Workstation
References · 119
- https://bdu.fstec.ru/vul/2025-02375 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-22226 · Security Note
- https://twitter.com/VulmonFeeds/status/1896911693826883819 · Twitter Post
- https://twitter.com/jbhall56/status/2019404819828731962 · Twitter Post
- https://t.me/cvenotify/113383 · Telegram Post
- https://twitter.com/cybercronai/status/1896999744980869194 · Twitter Post
- https://twitter.com/NickBla41002745/status/1899008335548186652 · Twitter Post
- https://twitter.com/The_Cyber_News/status/1897250563848614243 · Twitter Post
- https://twitter.com/TweetThreatNews/status/1897502787572760929 · Twitter Post
- https://reddit.com/r/pwnhub/comments/1j58jiy/vmware_esxi_vulnerabilities_leave_enterprises · Reddit Post
- https://reddit.com/r/k12cybersecurity/comments/1j43b8f/msisac_cybersecurity_advisory_multiple · Reddit Post
- https://reddit.com/r/cybersecurity/comments/1j4u4xe/vmware_just_got_hit_with_3_zerodays_and_hackers · Reddit Post
- https://reddit.com/r/vmware/comments/1j3bhti/carbon_black_vs_zerolock_best_esxi_protection_on · Reddit Post
- https://reddit.com/r/pwnhub/comments/1q88top/vmware_zeroday_exploit_created_a_year_before · Reddit Post
- https://twitter.com/justabreach/status/2009705174277779816 · Twitter Post