- Description
- VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
- Source
- security@vmware.com
- NVD status
- Analyzed
- Products
- esxi, cloud_foundation, telco_cloud_infrastructure, telco_cloud_platform
CVSS 3.1
- Type
- Primary
- Base score
- 8.2
- Impact score
- 6
- Exploitability score
- 1.5
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- VMware ESXi Arbitrary Write Vulnerability
- Exploit added on
- Mar 4, 2025
- Exploit action due
- Mar 25, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
#ICYMI CVE-2025-22225 in VMware ESXi now used in active ransomware attacks. https://t.co/X161K7vYcn
@jc_vazquez
20 Mar 2026
117 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22225 | 53 mentions | Vendors: vmware | Active Exploitation | cloud_foundation, esxi, telco_cloud_infrastructure | 2[.]0, 2[.]2, 2[.]5, 2[.]7, 3[.]0, 4[.]0 VulnSocial - your risk exposure provider. https://t.co/ns4js3puEK
@vulnsocial
6 Mar 2026
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Ransomware actors are actively exploiting VMware ESXi (CVE-2025-22225). Do you know which of your hypervisors are internet-exposed right now? Audit access, remove direct exposure, and patch immediately. #CyberSecurity #Ransomware https://t.co/Us3k0DCoAA
@ReremData
19 Feb 2026
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨 ¡ALERTA CRÍTICA EN VMWARE! 🚨 Se explota el CVE-2025-22225 en ESXi. Es un VM Escape: un atacante puede saltar de una VM y tomar control total del host. CISA ya confirmó ataques reales. 🛡️ ✅Parchea ya (Broadcom)✅Aísla consolas de gestión✅Revisa logs #CyberSe
@Priority_IT
13 Feb 2026
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks Source: @The_Cyber_News https://t.co/9TBGwvGyZc CISA recently confirmed that ransomware groups are actively exploiting CVE-2025-22225, a high-severity VMware ESXi sandbox escape vulnerability.
@upgradeoptions
10 Feb 2026
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA: VMware ESXi flaw (CVE-2025-22225) now exploited in ransomware attacks via @BleepinComputer #Proficio #ThreatNews #Cybersecurity #MSSP #MDR https://t.co/xRkTwO1Drq
@proficioinc
9 Feb 2026
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
#CISA confirms that #ransomware gangs are exploiting the #VMware ESXi sandbox escape flaw CVE-2025-22225. #CyberSecurity #InfoSec https://t.co/MSjG1LO8lz https://t.co/goZDXxm0g3
@twelvesec
8 Feb 2026
72 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22225 sandbox escape confirmed as ransomware attack vector. Exploitation toolkit predates Broadcom's patch by a full year. Read more: https://t.co/vDn2GXPOFv
@probablypwned
8 Feb 2026
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CISA: Ransomware intrusions exploiting VMware ESXi bug ongoing https://t.co/9S5Um8onEy BleepingComputer reports that the high-severity VMware ESXi sandbox escape issue, tracked as CVE-2025-22225, was confirmed by the Cybersecurity and Infrastructure Security Agency to have bee
@f1tym1
6 Feb 2026
67 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA confirms active exploitation of VMware ESXi vulnerability CVE-2025-22225 in ransomware attacks. Organizations urged to patch immediately. https://t.co/0E61dELnSp #Security #VMware #Ransomware #CISA #Vulnerability #Patch #Cyber #Threat #Attack #Malware #Exploit #Defense https
@dailytechonx
6 Feb 2026
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
“VMware ESXi” platformasında "0-day" təhlükəsizlik boşluğu (CVE-2025-22225) aşkarlanıb. #ETX #MilliCERT #cybersecurity #kibertəhlükəsizlik #xəbərdarlıq https://t.co/RfyndNVDhi
@CERTAzerbaijan
6 Feb 2026
78 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks Source: @The_Cyber_News https://t.co/9TBGwvH6OK CISA recently confirmed that ransomware groups are actively exploiting CVE-2025-22225, a high-severity VMware ESXi sandbox escape vulnerability. h
@upgradeoptions
6 Feb 2026
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Confirms Ransomware Actors Are Exploiting VMware ESXi Sandbox-Escape CVE-2025-22225 CISA confirmed CVE-2025-22225 (VMware ESXi sandbox escape) is being used in ransomware attacks nearly a year after it entered the KEV catalog, with details withheld—reinforcing that
@ThreatSynop
6 Feb 2026
71 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA: Ransomware intrusions exploiting VMware ESXi bug ongoing https://t.co/9S5Um8onEy BleepingComputer reports that the high-severity VMware ESXi sandbox escape issue, tracked as CVE-2025-22225, was confirmed by the Cybersecurity and Infrastructure Security Agency to have bee
@f1tym1
6 Feb 2026
83 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New developments from Help Net Security indicate that CISA has confirmed the exploitation of a critical VMware ESXi vulnerability, CVE-2025-22225, in active ransomware campaigns. This follows earlier Broadcom disclosures in March 2025 about a trio of zero-day flaws in VMware
@ox0ffff
6 Feb 2026
94 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA confirms exploitation of VMware ESXi flaw by ransomware attackers https://t.co/gjsVLyiSyg CVE-2025-22225, a VMware ESXi arbitrary write vulnerability, is being used in ransomware campaigns, CISA confirmed on Wednesday by updating the vulnerability’s entry in its Known Exp
@f1tym1
5 Feb 2026
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Flags VMware ESXi CVE-2025-22225 as Ransomware-Exploited After Huntress Links It to Zero-Day Exploit Toolkit CISA updated KEV to confirm ransomware actors are exploiting VMware ESXi arbitrary-write flaw CVE-2025-22225 (patched March 2025), with researchers tying
@ThreatSynop
5 Feb 2026
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA confirms exploitation of VMware ESXi flaw by ransomware attackers: CVE-2025-22225, a VMware ESXi arbitrary write vulnerability, is being used in ransomware campaigns, CISA confirmed on Wednesday by updating the vulnerability’s entry in its Known… https://t.co/eLyWSonEaU
@shah_sheikh
5 Feb 2026
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Urgent cybersecurity alert: CISA confirms ransomware gangs are now actively exploiting a VMware ESXi 0-day sandbox escape vulnerability (CVE-2025-22225) that lets attackers break out of VMs and control hypervisors — with ransomware deployment now observed in the wild. Patc
@vuln_tracker
5 Feb 2026
126 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Urgent cybersecurity alert: CISA confirms ransomware gangs are now actively exploiting a VMware ESXi 0-day sandbox escape vulnerability (CVE-2025-22225) that lets attackers break out of VMs and control hypervisors — with ransomware deployment now observed in the wild. Patc
@vuln_tracker
5 Feb 2026
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
【リンク集:2月4日〜5日のセキュリティ関連ニュース/記事】 <脆弱性> ・米CISA、VMware ESXiの脆弱性がランサムウェア攻撃に悪用されていると警告(CVE-2025-22225) https://t.co/TX3AYadGWx ・React2Shellを悪用した攻撃
@MachinaRecord
5 Feb 2026
126 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
以前ゼロデイ攻撃に使用されていたVMware ESXiの重大な脆弱性CVE-2025-22225がランサムウェア攻撃にも悪用され始めたことが報告されています。
@MalwareBibleJP
5 Feb 2026
1949 Impressions
8 Retweets
30 Likes
8 Bookmarks
0 Replies
0 Quotes
CISA reports active exploitation of VMware ESXi flaw CVE-2025-22225 in ransomware attacks. Broadcom patched this and related zero-days in March 2025. Added to CISA’s Known Exploited Vulnerabilities list. #VMware #Ransomware #USA https://t.co/owab7R8GGV
@TweetThreatNews
5 Feb 2026
52 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Warns of VMware ESXi 0-day Vulnerability Exploited in Ransomware Attacks Source: https://t.co/MEi11toP1l CISA recently confirmed that ransomware groups are actively exploiting CVE-2025-22225, a high-severity VMware ESXi sandbox escape vulnerability. This flaw, patch
@The_Cyber_News
5 Feb 2026
22325 Impressions
153 Retweets
419 Likes
119 Bookmarks
8 Replies
3 Quotes
🚨 CISA: VMware ESXi “0-day” (CVE-2025-22225) now exploited by ransomware crews for hypervisor takeover CISA says ransomware actors are actively exploiting CVE-2025-22225 (ESXi VMX sandbox escape via arbitrary kernel write), typically chained with CVE-2025-22224/22226 to br
@ThreatSynop
5 Feb 2026
72 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
米国CISA(サイバーセキュリティ・社会基盤安全保障庁)が、VMware ESXiに存在する脆弱性「CVE-2025-22225」がランサムウェア攻撃グループによって活発に悪用されているとして、注意を呼びかけています。
@omomuki_tech
5 Feb 2026
214 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
New developments from Security Affairs indicate that ransomware groups are actively exploiting CVE-2025-22225, a critical sandbox escape flaw in VMware ESXi, to conduct targeted attacks. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed exploitation
@ox0ffff
5 Feb 2026
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
VMware ESXiの脆弱性CVE-2025-22225がランサムウェアに悪用された。米国サイバーセキュリティ・社会基盤安全保障庁(CISA)の既知の悪用された脆弱性カタログが更新。 https://t.co/0m9mGnj45G
@__kokumoto
4 Feb 2026
3592 Impressions
19 Retweets
42 Likes
9 Bookmarks
0 Replies
0 Quotes
🚨 VMware ESXi sandbox-escape (CVE-2025-22225) now tied to active ransomware exploitation, CISA confirms CISA updated KEV to confirm ransomware actors are exploiting CVE-2025-22225 (ESXi VMX sandbox escape via arbitrary kernel write), elevating it from “patched” to “weapo
@ThreatSynop
4 Feb 2026
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks: Ransomware groups now exploit VMware ESXi vulnerability CVE-2025-22225, patched by Broadcom in March 2025. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirms that… https://t.co/E0Wpkz9Y4
@shah_sheikh
4 Feb 2026
56 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22225 in VMware ESXi now used in active ransomware attacks https://t.co/VFpM2Gm0D0 #BreakingNews https://t.co/QzkwJghHxv
@evanderburg
4 Feb 2026
87 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📢 𝐂𝐈𝐒𝐀: 𝐕𝐌𝐰𝐚𝐫𝐞 𝐄𝐒𝐗𝐢 𝐟𝐥𝐚𝐰 𝐧𝐨𝐰 𝐞𝐱𝐩𝐥𝐨𝐢𝐭𝐞𝐝 𝐢𝐧 𝐫𝐚𝐧𝐬𝐨𝐦𝐰𝐚𝐫𝐞 𝐚𝐭𝐭𝐚𝐜𝐤𝐬 • CISA confirmed ransomware groups are exploiting a high-severity
@PurpleOps_io
4 Feb 2026
57 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22225 in VMware ESXi now used in active ransomware Attacks https://t.co/hbzy9MijnH #securityaffairs #hacking
@securityaffairs
4 Feb 2026
44 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22225 https://t.co/OEPZVxatzz
@UK_Daniel_Card
4 Feb 2026
1766 Impressions
0 Retweets
14 Likes
3 Bookmarks
1 Reply
0 Quotes
🚨 Breaking: Chinese-linked hackers are exploiting VMware ESXi zero-days to break out of virtual machines and seize control of hypervisors! 😱 In a recent attack spotted by Huntress in December 2025, threat actors used three critical flaws (CVE-2025-22224, CVE-2025-22225,
@justabreach
9 Jan 2026
120 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
The Great VM Escape: ESXi Exploitation in the Wild VMware:CVE-2025-22226+CVE-2025-22224+CVE-2025-22225 https://t.co/jenLx2KClQ Key: When vmci.sys is loaded, it owns the VMCI adapter and actively uses these same I/O ports. Two drivers cannot safely share the same hardware, if ht
@blackorbird
9 Jan 2026
12917 Impressions
28 Retweets
138 Likes
72 Bookmarks
1 Reply
2 Quotes
中国系脅威主体はVMware ESXiのゼロデイ脆弱性を開示の1年前には悪用していたとみられる。Huntress社報告。CVE-2025-22224, CVE-2025-22225, CVE-2025-22226の3件。攻撃用バイナリのPDBパスに2024_02_19の文字列。攻撃用バイナリ
@__kokumoto
8 Jan 2026
1177 Impressions
3 Retweets
10 Likes
4 Bookmarks
0 Replies
0 Quotes
CVE-2025-22224 + CVE-2025-22225 + CVE-2025-22226 = ebat fbi
@networker_sup
23 Jul 2025
44 Impressions
0 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
#Vulnerability #CVE202522224 CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Critical VMware Vulnerabilities Exploited https://t.co/mer0g3Dson
@Komodosec
11 Apr 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
>CVE-2025-22224、CVE-2025-22225、CVE-2025-22226 複数の脆弱性情報を活用し、侵害できる能力があるというか、当然攻撃を試すラボも拠点に持っているんでしょうね
@ETomatot24044
31 Mar 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical VMware vulnerabilities patched (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) - one actively exploited. ESXi, Workstation, Fusion at risk. Requires local admin access but can lead to code execution & sandbox escape. Patch now! https://t.co/2Z3nv9MVl9
@RedTeamNewsBlog
24 Mar 2025
3 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Recent #VMware vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) pose a critical threat, allowing attackers to escape compromised VMs and seize control of the hypervisor. The active exploitation of these flaws has made this risk more severe than ever, with… https:/
@sygnia_labs
19 Mar 2025
93 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
3 ثغرات خطيرة في VMware: مخاطر حقيقية وتحديثات عاجلة أصدرت Broadcom في 4 مارس تحديثات طارئة لمعالجة 3 ثغرات خطيرة (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) تؤثر على ESXi وWorkstation وFusion. إحدى هذه الثغرات (CVE-2025-22224) تم استغلالها فعليًا وتسمح للمهاجمين بالخروج…
@KasperskyKSA
18 Mar 2025
200 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Three VMware Vulnerabilities: Key Risks and Urgent Patches On March 4, Broadcom released emergency updates for three critical VMware vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) affecting ESXi, Workstation, and Fusion. At least one (CVE-2025-22224) has been…
@KasperskyKSA
17 Mar 2025
172 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
VMware three vulnerabilities CVE-2025-22224, CVE-2025-22225, CVE-2025-22226. hackers are back in business.
@XiaoChuStudio
15 Mar 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/vW1vyg6OAh https://t.co/giNB4ixH3n
@NickBla41002745
14 Mar 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Tech alert: Critical VMware vulnerabilities are putting systems at risk! Discover how CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226 could impact ESXi, Workstation, and more. Protect your data now! Read the advisory for more. https://t.co/5cS5XkWqLH #CyberSecurity https://t
@sequretek_sqtk
14 Mar 2025
31 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
VMware Patches 3 Zero-Day Vulnerabilities After Active Exploitation ⚠️ https://t.co/9vjyWHCndI Broadcom has addressed three zero-day vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) in #VMware ESXi, Workstation, and Fusion, following reports of active… https://
@Huntio
13 Mar 2025
84 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
On March 4th, Broadcom released patches for vulnerabilities affecting VMware products: CVE-2025-22224, CVE-2025-22225, CVE-2025-22226. Check out the details here: https://t.co/19v4hvhMGt
@redhataugust
12 Mar 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📣Critical Security Alert: VMware has issued a critical security alert for vulnerabilities in ESXi, Workstation, Fusion, Cloud Foundation, and Telco Cloud Infrastructure. These threats (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) are being exploited. Protect your systems now…
@Helient
11 Mar 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*",
"matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*",
"matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*",
"matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*",
"matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*",
"matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*",
"matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*",
"matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*",
"matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*",
"matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*",
"matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*",
"matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*",
"matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*",
"matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*",
"matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*",
"matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*",
"matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*",
"matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*",
"matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*",
"matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*",
"matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*",
"matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*",
"matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*",
"matchCriteriaId": "F50302BB-B950-4178-A109-358393E0A50A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*",
"matchCriteriaId": "BCCA4A31-1291-4FB4-9FA5-D2CCD086D660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*",
"matchCriteriaId": "78604FE5-510F-4979-B2E3-D36B3083224A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*",
"matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*",
"matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*",
"matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*",
"matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*",
"matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*",
"matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*",
"matchCriteriaId": "18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*",
"matchCriteriaId": "B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*",
"matchCriteriaId": "ED92209F-FBD6-43F9-9A15-3842B139FCC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*",
"matchCriteriaId": "6B701151-1B57-4E2D-A9AB-586FACEA2385",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*",
"matchCriteriaId": "4230B9AA-9E0C-4AE2-814D-8DD641394879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*",
"matchCriteriaId": "F2FA150B-93E4-44D2-BF6D-347085A95776",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A7BB38-3238-413E-9736-F1A165D40867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E46A694-8698-4283-9E25-01F222B63E9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59B9476F-E5E7-46B6-AC38-4630D0933462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9A045567-2563-4539-8E95-361087CB7762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D11103A7-6AB5-4E78-BE11-BC2A04A09F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5F01D7-2675-4D09-B52B-B02D0EF52AEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F8D61F-6E8B-4EE3-91DE-EBA6FF7D289E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B1E94D58-26A0-4E84-8CAD-F8CDB6707642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FC33D39A-5760-467E-8284-F4E5D8082BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "448206AA-A023-4AA1-98FD-35BC2A2AB2B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F6E30F8-B977-40A5-9E45-89B5C5E59170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6B84F65-2E52-4445-8F97-2729B84B18E3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]