• Book Dewayne Hart
  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
  • Speaker Bio
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
  • Home
  • About
  • Speaker
  • Books
  • Podcast
  • Contact
  • Blog
Facebook-f Linkedin-in Youtube X-twitter Globe
Order books

VMware Security Flaws Exploited in the Wild—Broadcom Releases Urgent Patches

Posted on March 4, 2025 by admin

[ad_1]

Mar 04, 2025Ravie LakshmananVulnerability / Cloud Security

VMware Security Flaws

Broadcom has released security updates to address three actively exploited security flaws in VMware ESXi, Workstation, and Fusion products that could lead to code execution and information disclosure.

The list of vulnerabilities is as follows –

  • CVE-2025-22224 (CVSS score: 9.3) – A Time-of-Check Time-of-Use (TOCTOU) vulnerability that leads to an out-of-bounds write, which a malicious actor with local administrative privileges on a virtual machine could exploit to execute code as the virtual machine’s VMX process running on the host
  • CVE-2025-22225 (CVSS score: 8.2) – An arbitrary write vulnerability that a malicious actor with privileges within the VMX process could exploit to result in a sandbox escape
  • CVE-2025-22226 (CVSS score: 7.1) – An information disclosure vulnerability due to an out-of-bounds read in HGFS that a malicious actor with administrative privileges to a virtual machine could exploit to leak memory from the vmx process
Cybersecurity

The shortcomings impact the below versions –

  • VMware ESXi 8.0 – Fixed in ESXi80U3d-24585383, ESXi80U2d-24585300
  • VMware ESXi 7.0 – Fixed in ESXi70U3s-24585291
  • VMware Workstation 17.x – Fixed in 17.6.3
  • VMware Fusion 13.x – Fixed in 13.6.3
  • VMware Cloud Foundation 5.x – Async patch to ESXi80U3d-24585383
  • VMware Cloud Foundation 4.x – Async patch to ESXi70U3s-24585291
  • VMware Telco Cloud Platform 5.x, 4.x, 3.x, 2.x – Fixed in ESXi 7.0U3s, ESXi 8.0U2d, and ESXi 8.0U3d
  • VMware Telco Cloud Infrastructure 3.x, 2.x – Fixed in ESXi 7.0U3s

In a separate FAQ, Broadcom acknowledged that it has “information to suggest that exploitation of these issues has occurred ‘in the wild,’ but it did not elaborate on the nature of the attacks or the identity of the threat actors that have weaponized them.

The virtualization services provider credited the Microsoft Threat Intelligence Center for discovering and reporting the bugs. In light of active exploitation, it’s essential that users apply the latest patches for optimal protection.

Found this article interesting? Follow us on Twitter  and LinkedIn to read more exclusive content we post.



[ad_2]

Recent Posts

  • No Blind Spots: A Veteran’s Blueprint to Protect Critical Infrastructure
  • Cybersecurity as a Growth Lever: A Board-Ready Playbook for CIOs and CTOs
  • From Reaction to Readiness: Building a Cybersecurity Mindset for Proactive Defense
  • Cybersecurity Leadership in 2026: Executive Decisions that Drive Resilience and Growth
  • Implementing a Hacker’s Mindset: Build a Security Culture That Hunts, Learns, and Wins

Recent Comments

No comments to show.

Archives

  • March 2026
  • February 2026
  • July 2025
  • May 2025
  • April 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024
  • October 2024
  • September 2024
  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023

Categories

  • Cyber News
  • Uncategorized

Book Dewayne Hart for your next event

  • Dewaynehart@dewaynehart.com
  • (470) 409 8316
Facebook-f Linkedin-in Youtube X-twitter Globe
© 2025 Dewayne Hart | Cybersecurity Leadership & Innovation