No items found.
March 6, 2025
·
0
Minutes Read

Critical VMware ESXi, Workstation, Fusion Vulnerabilities Seen Exploited in Wild

Advisory
Threat Research
March 6, 2025
·
0
Minutes Read

Critical VMware ESXi, Workstation, Fusion Vulnerabilities Seen Exploited in Wild

This is some text inside of a div block.
This is some text inside of a div block.
·
0
Minutes Read
Kudelski Security Team
Find out more
table of contents
Share on
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Summary

On March 4th, Microsoft’s Threat Intelligence Center (MSTIC) uncovered three critical vulnerabilities in VMware products that are being actively exploited in the wild. Affected are VMware ESXi, Workstation, Fusion, Cloud Foundation, and Telco Cloud Platform products, allowing remote code execution (RCE) and privilege escalation. The vulnerabilities, identified as CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226, were discovered following targeted threat actor activity. CISA has since added the bugs to its Known Exploited Vulnerabilities Catalog. Attackers can exploit these flaws to gain unauthorized access to systems, execute arbitrary code remotely, and escalate privileges, posing a significant risk to environments relying on these VMware solutions.

Two of these vulnerabilities are classified as Critical and pose significant risks to VMware users, while one, CVE-202522226, is marked as Important but still requires immediate attention due to its potential for data leakage.

Affected Systems and/or Applications

The following table captures the essential details about the affected VMware products, versions, identified vulnerabilities, severity, and the fixed versions.

VMware ProductVersionCVE(s)CVSSv3Severit yFixed Version
VMware ESXi8.0CVE-2025-22224, CVE-2025-22225, CVE-2025-222269.3, 8.2, 7.1CriticalESXi80U3d-24585383
VMware ESXi7.0CVE-2025-22224, CVE-2025-22225, CVE-2025-222269.3, 8.2, 7.1CriticalESXi70U3s-24585291
VMware Workstation17.xCVE-2025-22224, CVE-2025-222269.3, 7.1Critical17.6.3
VMware Fusion13.xCVE-2025-222267.1Import ant13.6.3
VMware Cloud Foundation5.xCVE-2025-22224, CVE-2025-22225, CVE-2025-222269.3, 8.2, 7.1CriticalAsync patch to ESXi80U3d- 24585383
VMware Cloud Foundation4.5.xCVE-2025-22224, CVE-2025-22225, CVE-2025-222269.3, 8.2, 7.1CriticalAsync patch to ESXi70U3s- 24585291
VMware Telco Cloud Platform5.x, 4.x, 3.x, 2.xCVE-2025-22224, CVE-2025-22225, CVE-2025-222269.3, 8.2, 7.1CriticalESXi 7.0U3s, ESXi 8.0U2d, and ESXi 8.0U3d
VMware Telco Cloud Infrastructure3.x, 2.xCVE-2025-22224, CVE-2025-22225, CVE-2025-222269.3, 8.2, 7.1CriticalESXi 7.0U3s

Technical Details / Attack Overview

CVE-2025-22224: A Time-of-Check Time-of-Use (TOCTOU) vulnerability

CVSSv3: 9.3 – Critical Severity

A Time-of-Check Time-of-Use (TOCTOU) race condition in VMware ESXi and Workstation allows attackers with administrative VM privileges to exploit a heap overflow vulnerability in the VMX process. This grants attackers control over the host system, enabling lateral movement across virtualized environments.

CVE-2025-22225: Sandbox Escape via Arbitrary Write

CVSSv3: 8.2 – High Severity

Authenticated attackers can write arbitrary data to ESXi hosts through the VMX process, triggering sandbox escapes. By manipulating kernel memory, attackers escalate privileges to deploy malware or disrupt services. This is particularly dangerous in multi-tenant environments.

CVE-2025-22226: Hypervisor Memory Leakage

CVSSv3: 7.1 – Moderate Severity

An out-of-bounds read in VMware’s Host Guest File System (HGFS) enables attackers to extract sensitive data such as encryption keys and credentials from the VMX process. While less severe, this flaw provides valuable reconnaissance data for future attacks.

Mitigation

Ensure that the latest patches from VMware are applied to the following products:

  • VMware ESXi: Update the latest available versions forESXi 8.0/7.0
  • VMware Workstation/Fusion: Update to 17.6.3 and 13.6.3 respectively
  • VMware Cloud Foundation: Update to ESXi 7.0U3s, ESXi 8.0U2d, and ESXi 8.0U3d (KB389385 ) VMware Telco Cloud Platform: Update to ESXi 7.0U3s (KB389385 )

What is the CFC doing ?

The CFC will continue to monitor the situation and send an advisory update if needed. Clients subscribed to our vulnerability scan services will receive relevant results if critical vulnerabilities are found within the scope of the scans as soon as a relevant plugin is made available by the scan provider.

Tenable IDs:

References

Related Post