First published: Tue Mar 04 2025(Updated: )
VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2025-22225 is considered a high severity vulnerability due to its potential for arbitrary kernel writes.
To mitigate CVE-2025-22225, ensure that VMware ESXi is updated to the latest security patch provided by VMware.
CVE-2025-22225 affects users of VMware ESXi who have configured permissions that allow access to the VMX process.
CVE-2025-22225 is classified as an arbitrary write vulnerability, which may lead to a sandbox escape.
Yes, CVE-2025-22225 can potentially allow a malicious actor to escalate privileges within the affected system.