First published: Tue Mar 04 2025(Updated: )
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi | ||
VMware Workstation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-22224 is rated as a high severity vulnerability due to its potential for remote code execution.
To mitigate CVE-2025-22224, update VMware ESXi and Workstation to the latest versions provided by VMware.
CVE-2025-22224 affects users with local administrative privileges on VMware ESXi and Workstation.
CVE-2025-22224 is a TOCTOU (Time-of-Check Time-of-Use) vulnerability leading to out-of-bounds write.
An attacker exploiting CVE-2025-22224 could execute arbitrary code as the virtual machine's VMX process on the host.