Cyber Posture

CVE-2025-22225

HighCISA KEVActive ExploitationRansomware-linked

Published: 04 March 2025

Published
04 March 2025
Modified
30 October 2025
KEV Added
04 March 2025
Patch
CVSS Score 8.2 CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0998 93.1th percentile
Risk Priority 42 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may break out of a container or virtualized environment to gain access to the underlying host.

Security Summary

CVE-2025-22225 is an arbitrary write vulnerability in VMware ESXi, specifically affecting the VMX process. A malicious actor with privileges within the VMX process can trigger an arbitrary kernel write, enabling escape from the sandbox. The vulnerability carries a CVSS v3.1 base score of 8.2 (AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H) and maps to CWE-787 (Out-of-bounds Write) and CWE-123 (Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')).

Exploitation requires local access to the ESXi host with high privileges within the VMX process, low attack complexity, and no user interaction. Successful exploitation results in a scope change from the VMX sandbox to the host kernel, granting high-impact confidentiality, integrity, and availability compromises, such as full host takeover.

The Broadcom security advisory provides details on affected versions and patches at https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390. CISA has listed CVE-2025-22225 in its Known Exploited Vulnerabilities Catalog at https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22225, indicating real-world exploitation by malicious actors.

This vulnerability, published on 2025-03-04, underscores the risks of VMX process privileges in virtualized environments and the urgency of applying vendor patches.

Details

CWE(s)
CWE-787CWE-123
KEV Date Added
04 March 2025

Affected Products

vmware
esxi
7.0, 8.0
vmware
cloud foundation
all versions
vmware
telco cloud infrastructure
2.2, 2.5, 2.7, 3.0
vmware
telco cloud platform
2.0, 2.5, 2.7, 3.0, 4.0

MITRE ATT&CK Enterprise Techniques

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
T1611 Escape to Host Privilege Escalation
Adversaries may break out of a container or virtualized environment to gain access to the underlying host.
Why these techniques?

Arbitrary kernel write from VMX sandbox directly enables sandbox escape to host (T1611) and exploitation for privilege escalation to full host control (T1068).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References