CVE-2025-22224

Published Mar 4, 2025

Last updated 3 months ago

Exploit knownCVSS critical 9.3
VMware
VMware ESXi
VMware Workstation

Overview

AI description

Automated description summarized from trusted sources.

CVE-2025-22224 is a critical vulnerability affecting VMware ESXi and Workstation products. It's a time-of-check to time-of-use (TOCTOU) race condition flaw that can lead to an out-of-bounds write within the VMCI (Virtual Machine Communication Interface). An attacker with local administrator privileges on a virtual machine can exploit this vulnerability to execute code as the virtual machine's VMX process running on the host. This vulnerability allows attackers to escalate privileges from a compromised virtual machine to the underlying host system. Successful exploitation could grant the attacker control over the entire ESXi host, potentially impacting other virtual machines running on the same server. This vulnerability is known to be actively exploited in the wild.

Description
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Source
security@vmware.com
NVD status
Analyzed
Products
esxi, cloud_foundation, telco_cloud_infrastructure, telco_cloud_platform, workstation

Risk scores

CVSS 3.1

Type
Primary
Base score
8.2
Impact score
6
Exploitability score
1.5
Vector string
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Severity
HIGH

Known exploits

Data from CISA

Vulnerability name
VMware ESXi and Workstation TOCTOU Race Condition Vulnerability
Exploit added on
Mar 4, 2025
Exploit action due
Mar 25, 2025
Required action
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Weaknesses

nvd@nist.gov
CWE-367
134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE-367

Social media

Hype score
Not currently trending
  1. China-linked threat actors exploited three #ESXi zero-days (CVE-2025-22224/25/26) to escape guest #VMs and gain hypervisor control. Initial access via compromised SonicWall VPN. Tooling includes MAESTRO and VSOCKpuppet for stealthy persistence. CISA added flaws to KEV. https://t.

    @MeridianEU

    13 Jan 2026

    57 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  2. Vulnerability Alert China-linked actors are exploiting VMware ESXi zero-days to escape VMs and gain hypervisor control (CVE-2025-22224/25/26). Patch immediately. #CyberSecurity #VMware #ESXi #ZeroDay https://t.co/qB4fQkoG3x

    @CloneSystemsInc

    12 Jan 2026

    88 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. 🚨中國駭客利用VMware ESXi 0-day 實現虛擬機逃逸 Huntress 揭露攻擊工具包「MAESTRO」中串聯 3 個漏洞(CVE-2025-22224/22225/22226) 從 Guest VM 逃逸至 Hypervisor其開發時間比官方揭露早一年 全球仍有 30,000+ 曝險實例 ref:https://t.co/o

    @lfcba8178

    12 Jan 2026

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. 🚨 MAESTRO Toolkit Chains ESXi Zero-Days to Escape VMs and Take Over Hypervisors Huntress reports attackers used stolen SonicWall VPN credentials, then deployed the “MAESTRO” toolkit to exploit VMware ESXi VM-escape bugs (CVE-2025-22224/22225/22226), pivot into the hypervis

    @ThreatSynop

    9 Jan 2026

    59 Impressions

    0 Retweets

    0 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  5. 🚨 China-Linked Hackers Chain ESXi Zero-Days to Escape VMs and Backdoor the Hypervisor via VSOCK Huntress-linked activity shows attackers using a compromised SonicWall VPN for initial access, then chaining VMware ESXi zero-days (CVE-2025-22224/22225/22226) to escape a guest VM

    @ThreatSynop

    9 Jan 2026

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. 🚨 Breaking: Chinese-linked hackers are exploiting VMware ESXi zero-days to break out of virtual machines and seize control of hypervisors! 😱 In a recent attack spotted by Huntress in December 2025, threat actors used three critical flaws (CVE-2025-22224, CVE-2025-22225,

    @justabreach

    9 Jan 2026

    120 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  7. The Great VM Escape: ESXi Exploitation in the Wild VMware:CVE-2025-22226+CVE-2025-22224+CVE-2025-22225 https://t.co/jenLx2KClQ Key: When vmci.sys is loaded, it owns the VMCI adapter and actively uses these same I/O ports. Two drivers cannot safely share the same hardware, if ht

    @blackorbird

    9 Jan 2026

    12917 Impressions

    28 Retweets

    138 Likes

    72 Bookmarks

    1 Reply

    2 Quotes

  8. 中国系脅威主体はVMware ESXiのゼロデイ脆弱性を開示の1年前には悪用していたとみられる。Huntress社報告。CVE-2025-22224, CVE-2025-22225, CVE-2025-22226の3件。攻撃用バイナリのPDBパスに2024_02_19の文字列。攻撃用バイナリ

    @__kokumoto

    8 Jan 2026

    1177 Impressions

    3 Retweets

    10 Likes

    4 Bookmarks

    0 Replies

    0 Quotes

  9. CVE-2025-22224 + CVE-2025-22225 + CVE-2025-22226 = ebat fbi

    @networker_sup

    23 Jul 2025

    44 Impressions

    0 Retweets

    4 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  10. CVE-2025-22224 : VMware ESXi TOCTOU (Time-of-Check Time-of-Use) vulnerability Patch https://t.co/mEXJeawDP1

    @freedomhack101

    15 Jul 2025

    81 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  11. CVE-2025-22224 (VMware ESXi) https://t.co/evTdcRZFBR

    @alisaesage

    14 Jul 2025

    6902 Impressions

    15 Retweets

    112 Likes

    54 Bookmarks

    3 Replies

    0 Quotes

  12. CVE-2025-22224 https://t.co/qRCY4rz2oK

    @alisaesage

    14 Jul 2025

    428 Impressions

    1 Retweet

    4 Likes

    1 Bookmark

    0 Replies

    0 Quotes

  13. Escalada de privilegios mediante la condición de carrera TOCTOU en VMware VMX (CVE-2025-22224) https://t.co/9P4TfCPSgg #Informatica #Noticiaslibres #SeguridadInformatica

    @f3nixh4ck

    3 Jun 2025

    5 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  14. This time I was careful, last time with my other project in 2024 - Microsoft seized it and issued CVE-2025-22224….

    @IcedSkunk

    2 Jun 2025

    43 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  15. Well well, let’s focus on building my sandbox today - my elf payload works, hmm.. the vm escape by using VMx … unfortunately Microsoft got aware because I leaked in IG and they published CVE-2025-22224 - but I’m going to round it up with a rowhammer attack - just testing

    @IcedSkunk

    1 Jun 2025

    15 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  16. #APT29, #APT41, and #APT28 just RSVP’d to VMware’s latest zero-day fiesta 🎉 CVE-2025-22224 is wide open, your ESXi stack is sweating, and your threat intel report is… TBD. But sure, wait till Monday. Or click this, pretend you were ahead of it all along 😏

    @alphahunt_io

    24 Apr 2025

    51 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  17. #Vulnerability #CVE202522224 CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Critical VMware Vulnerabilities Exploited https://t.co/mer0g3Dson

    @Komodosec

    11 Apr 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  18. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    4 Apr 2025

    23 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  19. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    3 Apr 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  20. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    2 Apr 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  21. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    2 Apr 2025

    19 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  22. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    2 Apr 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  23. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    31 Mar 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  24. >CVE-2025-22224、CVE-2025-22225、CVE-2025-22226 複数の脆弱性情報を活用し、侵害できる能力があるというか、当然攻撃を試すラボも拠点に持っているんでしょうね

    @ETomatot24044

    31 Mar 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  25. Critical VMware vulnerabilities patched (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) - one actively exploited. ESXi, Workstation, Fusion at risk. Requires local admin access but can lead to code execution & sandbox escape. Patch now! https://t.co/2Z3nv9MVl9

    @RedTeamNewsBlog

    24 Mar 2025

    3 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  26. VMware製品の重大な脆弱性(CVE-2025-22224ほか)を悪用したランサムウェア攻撃が世界中で多発している。攻撃者はESXiなどの仮想化基盤に侵入し、権限昇格や認証情報の窃取を行い、VM全体を暗号化する。

    @yousukezan

    22 Mar 2025

    14981 Impressions

    114 Retweets

    205 Likes

    57 Bookmarks

    0 Replies

    4 Quotes

  27. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    19 Mar 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  28. Recent #VMware vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) pose a critical threat, allowing attackers to escape compromised VMs and seize control of the hypervisor. The active exploitation of these flaws has made this risk more severe than ever, with… https:/

    @sygnia_labs

    19 Mar 2025

    93 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  29. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    18 Mar 2025

    26 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  30. 3 ثغرات خطيرة في VMware: مخاطر حقيقية وتحديثات عاجلة أصدرت Broadcom في 4 مارس تحديثات طارئة لمعالجة 3 ثغرات خطيرة (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) تؤثر على ESXi وWorkstation وFusion. إحدى هذه الثغرات (CVE-2025-22224) تم استغلالها فعليًا وتسمح للمهاجمين بالخروج…

    @KasperskyKSA

    18 Mar 2025

    200 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  31. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    17 Mar 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  32. Three VMware Vulnerabilities: Key Risks and Urgent Patches On March 4, Broadcom released emergency updates for three critical VMware vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) affecting ESXi, Workstation, and Fusion. At least one (CVE-2025-22224) has been…

    @KasperskyKSA

    17 Mar 2025

    172 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  33. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    16 Mar 2025

    14 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  34. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    15 Mar 2025

    6 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  35. VMware three vulnerabilities CVE-2025-22224, CVE-2025-22225, CVE-2025-22226. hackers are back in business.

    @XiaoChuStudio

    15 Mar 2025

    17 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  36. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    15 Mar 2025

    10 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  37. CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/vW1vyg6OAh https://t.co/giNB4ixH3n

    @NickBla41002745

    14 Mar 2025

    29 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  38. Tech alert: Critical VMware vulnerabilities are putting systems at risk! Discover how CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226 could impact ESXi, Workstation, and more. Protect your data now! Read the advisory for more. https://t.co/5cS5XkWqLH #CyberSecurity https://t

    @sequretek_sqtk

    14 Mar 2025

    31 Impressions

    1 Retweet

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  39. VMware Patches 3 Zero-Day Vulnerabilities After Active Exploitation ⚠️ https://t.co/9vjyWHCndI Broadcom has addressed three zero-day vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) in #VMware ESXi, Workstation, and Fusion, following reports of active… https://

    @Huntio

    13 Mar 2025

    84 Impressions

    0 Retweets

    3 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  40. On March 4th, Broadcom released patches for vulnerabilities affecting VMware products: CVE-2025-22224, CVE-2025-22225, CVE-2025-22226. Check out the details here: https://t.co/19v4hvhMGt

    @redhataugust

    12 Mar 2025

    11 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  41. 📣Critical Security Alert: VMware has issued a critical security alert for vulnerabilities in ESXi, Workstation, Fusion, Cloud Foundation, and Telco Cloud Infrastructure. These threats (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) are being exploited. Protect your systems now…

    @Helient

    11 Mar 2025

    40 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  42. CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/KuDnAIxELh https://t.co/p0B8PSF0f0

    @NickBla41002745

    11 Mar 2025

    46 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  43. Over 40,400 VMware ESXi instances are vulnerable to CVE-2025-22224.CVE-2025-22224, is a critical out-of-bounds write flaw that is being actively exploited.#Brazil, #USA, #Europe , #VMware, #ESXi, #Broadcom, #Hypervisor, #Cybersecurity.Learn more here: https://t.co/u32QNALHEC http

    @kingops3c

    11 Mar 2025

    61 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  44. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    11 Mar 2025

    20 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  45. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    10 Mar 2025

    25 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  46. Over 37,000 VMware ESXi servers vulnerable to ongoing attacks Internet-exposed VMware ESXi instances are vulnerable to CVE-2025-22224, a critical out-of-bounds write flaw that is actively exploited in the wild https://t.co/NLIS2dQ3FT https://t.co/oeGtT23y7e

    @actisoft_tech

    10 Mar 2025

    59 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  47. CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/4Y9SjCmopV https://t.co/gUIjoFz9hV

    @NickBla41002745

    10 Mar 2025

    64 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  48. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    10 Mar 2025

    24 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

  49. CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/7l0O8zkKm0 https://t.co/1oo0hqYi9x

    @dansantanna

    9 Mar 2025

    63 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  50. Actively exploited CVE : CVE-2025-22224

    @transilienceai

    9 Mar 2025

    22 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    1 Reply

    0 Quotes

Configurations