Cyber Posture

CVE-2025-22224

CriticalCISA KEVActive Exploitation

Published: 04 March 2025

Published
04 March 2025
Modified
30 October 2025
KEV Added
04 March 2025
Patch
CVSS Score 9.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.4730 97.7th percentile
Risk Priority 67 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may break out of a container or virtualized environment to gain access to the underlying host.

Security Summary

CVE-2025-22224 is a Time-of-Check Time-of-Use (TOCTOU) vulnerability in VMware ESXi and Workstation that results in an out-of-bounds write. This flaw, associated with CWE-367, carries a CVSS v3.1 base score of 9.3 (AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H) and was published on 2025-03-04.

A malicious actor with local administrative privileges on a virtual machine can exploit this vulnerability to execute arbitrary code as the virtual machine's VMX process running on the host, potentially leading to full compromise of the hypervisor environment.

Mitigation details are available in the Broadcom security advisory at https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390. The vulnerability is also listed in the CISA Known Exploited Vulnerabilities catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224, indicating active exploitation in the wild.

Details

CWE(s)
CWE-367
KEV Date Added
04 March 2025

Affected Products

vmware
esxi
7.0, 8.0
vmware
cloud foundation
all versions
vmware
telco cloud infrastructure
2.2, 2.5, 2.7, 3.0
vmware
telco cloud platform
2.0, 2.5, 2.7, 3.0, 4.0
vmware
workstation
17.0 — 17.6.3

MITRE ATT&CK Enterprise Techniques

T1611 Escape to Host Privilege Escalation
Adversaries may break out of a container or virtualized environment to gain access to the underlying host.
Why these techniques?

The TOCTOU out-of-bounds write vulnerability in the VMware hypervisor directly enables a local VM administrator to execute arbitrary code in the host VMX process, achieving escape from the guest VM to the underlying host.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References