vulnerability
VMSA-2025-0004: VMware ESXi arbitrary write vulnerability (CVE-2025-22225)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:L/AC:L/Au:S/C:C/I:C/A:C) | Mar 4, 2025 | Mar 4, 2025 | Oct 7, 2025 |
Severity
7
CVSS
(AV:L/AC:L/Au:S/C:C/I:C/A:C)
Published
Mar 4, 2025
Added
Mar 4, 2025
Modified
Oct 7, 2025
Description
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
Solutions
vmware-esxi67-upgrade-24514018vmware-esxi700-upgrade-24585291vmware-esxi701-upgrade-24585291vmware-esxi702-upgrade-24585291vmware-esxi703-upgrade-24585291vmware-esxi800-upgrade-24585300vmware-esxi801-upgrade-24585300vmware-esxi802-upgrade-24585300vmware-esxi803-upgrade-24585383
References
- CVE-2025-22225
- https://attackerkb.com/topics/CVE-2025-22225
- CWE-123
- CWE-787
- URL-https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390
- URL-https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/6-7/release-notes/esxi-update-and-patch-release-notes/vmware-esxi-67-patch-release-esxi670202503001.html
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.