First published: Tue Mar 04 2025(Updated: )
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi and Horizon DaaS | ||
VMware ESXi and Horizon DaaS | ||
VMware ESXi and Horizon DaaS | =7.0 | |
VMware ESXi and Horizon DaaS | =7.0-beta | |
VMware ESXi and Horizon DaaS | =7.0-update_1 | |
VMware ESXi and Horizon DaaS | =7.0-update_1a | |
VMware ESXi and Horizon DaaS | =7.0-update_1b | |
VMware ESXi and Horizon DaaS | =7.0-update_1c | |
VMware ESXi and Horizon DaaS | =7.0-update_1d | |
VMware ESXi and Horizon DaaS | =7.0-update_1e | |
VMware ESXi and Horizon DaaS | =7.0-update_2 | |
VMware ESXi and Horizon DaaS | =7.0-update_2a | |
VMware ESXi and Horizon DaaS | =7.0-update_2c | |
VMware ESXi and Horizon DaaS | =7.0-update_2d | |
VMware ESXi and Horizon DaaS | =7.0-update_2e | |
VMware ESXi and Horizon DaaS | =7.0-update_3 | |
VMware ESXi and Horizon DaaS | =7.0-update_3c | |
VMware ESXi and Horizon DaaS | =7.0-update_3d | |
VMware ESXi and Horizon DaaS | =7.0-update_3e | |
VMware ESXi and Horizon DaaS | =7.0-update_3f | |
VMware ESXi and Horizon DaaS | =7.0-update_3g | |
VMware ESXi and Horizon DaaS | =7.0-update_3i | |
VMware ESXi and Horizon DaaS | =7.0-update_3j | |
VMware ESXi and Horizon DaaS | =7.0-update_3k | |
VMware ESXi and Horizon DaaS | =7.0-update_3l | |
VMware ESXi and Horizon DaaS | =7.0-update_3m | |
VMware ESXi and Horizon DaaS | =7.0-update_3n | |
VMware ESXi and Horizon DaaS | =7.0-update_3o | |
VMware ESXi and Horizon DaaS | =7.0-update_3p | |
VMware ESXi and Horizon DaaS | =7.0-update_3q | |
VMware ESXi and Horizon DaaS | =7.0-update_3r | |
VMware ESXi and Horizon DaaS | =8.0 | |
VMware ESXi and Horizon DaaS | =8.0-a | |
VMware ESXi and Horizon DaaS | =8.0-b | |
VMware ESXi and Horizon DaaS | =8.0-c | |
VMware ESXi and Horizon DaaS | =8.0-update_1 | |
VMware ESXi and Horizon DaaS | =8.0-update_1a | |
VMware ESXi and Horizon DaaS | =8.0-update_1c | |
VMware ESXi and Horizon DaaS | =8.0-update_1d | |
VMware ESXi and Horizon DaaS | =8.0-update_2 | |
VMware ESXi and Horizon DaaS | =8.0-update_2b | |
VMware ESXi and Horizon DaaS | =8.0-update_2c | |
VMware ESXi and Horizon DaaS | =8.0-update_3 | |
VMware ESXi and Horizon DaaS | =8.0-update_3b | |
VMware ESXi and Horizon DaaS | =8.0-update_3c | |
VMware vCenter Server and Cloud Foundation | ||
VMware Telco Cloud Infrastructure | =2.2 | |
VMware Telco Cloud Infrastructure | =2.5 | |
VMware Telco Cloud Infrastructure | =2.7 | |
VMware Telco Cloud Infrastructure | =3.0 | |
VMware Telco Cloud Platform | =2.0 | |
VMware Telco Cloud Platform | =2.5 | |
VMware Telco Cloud Platform | =2.7 | |
VMware Telco Cloud Platform | =3.0 | |
VMware Telco Cloud Platform | =4.0 | |
VMware Telco Cloud Platform | =4.0.1 | |
VMware Telco Cloud Platform | =5.0 |
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-22225 is considered a high severity vulnerability due to its potential for arbitrary kernel writes.
To mitigate CVE-2025-22225, ensure that VMware ESXi is updated to the latest security patch provided by VMware.
CVE-2025-22225 affects users of VMware ESXi who have configured permissions that allow access to the VMX process.
CVE-2025-22225 is classified as an arbitrary write vulnerability, which may lead to a sandbox escape.
Yes, CVE-2025-22225 can potentially allow a malicious actor to escalate privileges within the affected system.