CVE-2025-22224
CRITICALCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Analysis
VMware ESXi and Workstation contain a TOCTOU race condition leading to out-of-bounds write, allowing local administrators on VMs to escape the sandbox and execute code as the VMX process on the host.
Technical Context
The CWE-367 TOCTOU race condition in the VM communication mechanism allows a malicious VM administrator to win a race between validation and use of shared data, triggering an out-of-bounds write that corrupts VMX process memory on the host.
Affected Products
['VMware ESXi', 'VMware Workstation']
Remediation
Apply VMware security patches. Restrict VM admin access. Monitor ESXi hosts for anomalous VMX process behavior. Implement vSphere Hardening Guide recommendations.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today