VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
Published 2025-03-04 12:15:34
Updated 2025-04-10 19:19:50
Source VMware
View at NVD,   CVE.org

Products affected by CVE-2025-22225

CVE-2025-22225 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
VMware ESXi Arbitrary Write Vulnerability
CISA required action:
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
CISA description:
VMware ESXi contains an arbitrary write vulnerability. Successful exploitation allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.
Notes:
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22225
Added on 2025-03-04 Action due date 2025-03-25

Exploit prediction scoring system (EPSS) score for CVE-2025-22225

11.79%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less

CVSS scores for CVE-2025-22225

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
8.2
HIGH CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1.5
6.0
NIST 2025-04-10
8.2
HIGH CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
1.5
6.0
VMware 2025-03-04

CWE ids for CVE-2025-22225

  • Any condition where the attacker has the ability to write an arbitrary value to an arbitrary location, often as the result of a buffer overflow.
    Assigned by: 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Primary)
  • The product writes data past the end, or before the beginning, of the intended buffer.
    Assigned by: nvd@nist.gov (Secondary)

References for CVE-2025-22225

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!