CVE-2025-22225
HIGHCVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
Analysis
VMware ESXi contains an arbitrary write vulnerability that allows privileged VMX process users to trigger kernel writes, enabling escape from the VMX sandbox to the ESXi kernel.
Technical Context
The CWE-787 out-of-bounds write allows the VMX process (which manages VM execution) to write to ESXi kernel memory. This is the second stage after CVE-2025-22224, escalating from VMX process compromise to full ESXi host kernel control.
Affected Products
['VMware ESXi']
Remediation
Apply VMware patches. Monitor ESXi for kernel integrity violations. Implement host-based monitoring for VMX process anomalies.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today