First published: Tue Mar 04 2025(Updated: )
VMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation and ESXi | ||
VMware ESXi and Horizon DaaS | ||
VMware Workstation and ESXi | ||
VMware ESXi and Horizon DaaS | =7.0 | |
VMware ESXi and Horizon DaaS | =7.0-beta | |
VMware ESXi and Horizon DaaS | =7.0-update_1 | |
VMware ESXi and Horizon DaaS | =7.0-update_1a | |
VMware ESXi and Horizon DaaS | =7.0-update_1b | |
VMware ESXi and Horizon DaaS | =7.0-update_1c | |
VMware ESXi and Horizon DaaS | =7.0-update_1d | |
VMware ESXi and Horizon DaaS | =7.0-update_1e | |
VMware ESXi and Horizon DaaS | =7.0-update_2 | |
VMware ESXi and Horizon DaaS | =7.0-update_2a | |
VMware ESXi and Horizon DaaS | =7.0-update_2c | |
VMware ESXi and Horizon DaaS | =7.0-update_2d | |
VMware ESXi and Horizon DaaS | =7.0-update_2e | |
VMware ESXi and Horizon DaaS | =7.0-update_3 | |
VMware ESXi and Horizon DaaS | =7.0-update_3c | |
VMware ESXi and Horizon DaaS | =7.0-update_3d | |
VMware ESXi and Horizon DaaS | =7.0-update_3e | |
VMware ESXi and Horizon DaaS | =7.0-update_3f | |
VMware ESXi and Horizon DaaS | =7.0-update_3g | |
VMware ESXi and Horizon DaaS | =7.0-update_3i | |
VMware ESXi and Horizon DaaS | =7.0-update_3j | |
VMware ESXi and Horizon DaaS | =7.0-update_3k | |
VMware ESXi and Horizon DaaS | =7.0-update_3l | |
VMware ESXi and Horizon DaaS | =7.0-update_3m | |
VMware ESXi and Horizon DaaS | =7.0-update_3n | |
VMware ESXi and Horizon DaaS | =7.0-update_3o | |
VMware ESXi and Horizon DaaS | =7.0-update_3p | |
VMware ESXi and Horizon DaaS | =7.0-update_3q | |
VMware ESXi and Horizon DaaS | =7.0-update_3r | |
VMware ESXi and Horizon DaaS | =8.0 | |
VMware ESXi and Horizon DaaS | =8.0-a | |
VMware ESXi and Horizon DaaS | =8.0-b | |
VMware ESXi and Horizon DaaS | =8.0-c | |
VMware ESXi and Horizon DaaS | =8.0-update_1 | |
VMware ESXi and Horizon DaaS | =8.0-update_1a | |
VMware ESXi and Horizon DaaS | =8.0-update_1c | |
VMware ESXi and Horizon DaaS | =8.0-update_1d | |
VMware ESXi and Horizon DaaS | =8.0-update_2 | |
VMware ESXi and Horizon DaaS | =8.0-update_2b | |
VMware ESXi and Horizon DaaS | =8.0-update_2c | |
VMware ESXi and Horizon DaaS | =8.0-update_3 | |
VMware ESXi and Horizon DaaS | =8.0-update_3b | |
VMware ESXi and Horizon DaaS | =8.0-update_3c | |
VMware vCenter Server and Cloud Foundation | ||
VMware Telco Cloud Infrastructure | =2.2 | |
VMware Telco Cloud Infrastructure | =2.5 | |
VMware Telco Cloud Infrastructure | =2.7 | |
VMware Telco Cloud Infrastructure | =3.0 | |
VMware Telco Cloud Platform | =2.0 | |
VMware Telco Cloud Platform | =2.5 | |
VMware Telco Cloud Platform | =2.7 | |
VMware Telco Cloud Platform | =3.0 | |
VMware Telco Cloud Platform | =4.0 | |
VMware Telco Cloud Platform | =4.0.1 | |
VMware Telco Cloud Platform | =5.0 | |
VMware Workstation and ESXi | >=17.0<17.6.3 |
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-22224 is rated as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2025-22224, update VMware ESXi and Workstation to the latest versions provided by VMware.
CVE-2025-22224 affects users with local administrative privileges on VMware ESXi and Workstation.
CVE-2025-22224 is a TOCTOU (Time-of-Check Time-of-Use) vulnerability leading to out-of-bounds write.
An attacker exploiting CVE-2025-22224 could execute arbitrary code as the virtual machine's VMX process on the host.