CVE-2025-22225

HIGH
2025-03-04 [email protected]
8.2
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 28, 2026 - 18:29 vuln.today
Added to CISA KEV
Oct 30, 2025 - 19:52 cisa
CISA KEV
CVE Published
Mar 04, 2025 - 12:15 nvd
HIGH 8.2

Description

VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

Analysis

VMware ESXi contains an arbitrary write vulnerability that allows privileged VMX process users to trigger kernel writes, enabling escape from the VMX sandbox to the ESXi kernel.

Technical Context

The CWE-787 out-of-bounds write allows the VMX process (which manages VM execution) to write to ESXi kernel memory. This is the second stage after CVE-2025-22224, escalating from VMX process compromise to full ESXi host kernel control.

Affected Products

['VMware ESXi']

Remediation

Apply VMware patches. Monitor ESXi for kernel integrity violations. Implement host-based monitoring for VMX process anomalies.

Priority Score

99
Low Medium High Critical
KEV: +50
EPSS: +7.9
CVSS: +41
POC: 0

Share

CVE-2025-22225 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy