CVE-2025-22224

CRITICAL
2025-03-04 [email protected]
9.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 28, 2026 - 18:29 vuln.today
Added to CISA KEV
Oct 30, 2025 - 19:52 cisa
CISA KEV
CVE Published
Mar 04, 2025 - 12:15 nvd
CRITICAL 9.3

Description

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

Analysis

VMware ESXi and Workstation contain a TOCTOU race condition leading to out-of-bounds write, allowing local administrators on VMs to escape the sandbox and execute code as the VMX process on the host.

Technical Context

The CWE-367 TOCTOU race condition in the VM communication mechanism allows a malicious VM administrator to win a race between validation and use of shared data, triggering an out-of-bounds write that corrupts VMX process memory on the host.

Affected Products

['VMware ESXi', 'VMware Workstation']

Remediation

Apply VMware security patches. Restrict VM admin access. Monitor ESXi hosts for anomalous VMX process behavior. Implement vSphere Hardening Guide recommendations.

Priority Score

149
Low Medium High Critical
KEV: +50
EPSS: +52.7
CVSS: +46
POC: 0

Share

CVE-2025-22224 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy