vulnerability
VMSA-2025-0004: VMware ESXi heap overflow vulnerability (CVE-2025-22224)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:L/AC:L/Au:N/C:C/I:C/A:C) | 2025-03-04 | 2025-03-04 | 2025-03-27 |
Severity
7
CVSS
(AV:L/AC:L/Au:N/C:C/I:C/A:C)
Published
2025-03-04
Added
2025-03-04
Modified
2025-03-27
Description
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Solution(s)
vmware-esxi67-upgrade-24514018vmware-esxi700-upgrade-24585291vmware-esxi701-upgrade-24585291vmware-esxi702-upgrade-24585291vmware-esxi703-upgrade-24585291vmware-esxi800-upgrade-24585300vmware-esxi801-upgrade-24585300vmware-esxi802-upgrade-24585300vmware-esxi803-upgrade-24585383
References
- CVE-2025-22224
- https://attackerkb.com/topics/CVE-2025-22224
- URL-https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390
- URL-https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/6-7/release-notes/esxi-update-and-patch-release-notes/vmware-esxi-67-patch-release-esxi670202503001.html

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.