Security Bulletin logo with a close up of a wolf in the background.
Security Bulletin logo with a close up of a wolf in the background.

Three VMware Zero-Days Exploited in the Wild Patched by Broadcom

Broadcom has released patches for three zero-day vulnerabilities exploited in the wild, affecting ESXi, Workstation, and Fusion. These vulnerabilities, discovered by Microsoft, range in severity from high to critical. 
Security Bulletin logo with a close up of a wolf in the background.
6 min read

On March 4, 2025, Broadcom released patches for three zero-day vulnerabilities exploited in the wild, affecting ESXi, Workstation, and Fusion. These vulnerabilities, discovered by Microsoft, range in severity from high to critical. 

Vulnerability   CVSS  Description 
CVE-2025-22224  9.3  A critical TOCTOU (Time-of-Check Time-of-Use) vulnerability in VMware ESXi and Workstation that allows a threat actor with local administrative privileges on a virtual machine to achieve code execution as the VMX process on the host. 
CVE-2025-22225  8.2  A high-severity arbitrary write vulnerability in VMware ESXi that allows a threat actor with VMX process privileges to perform arbitrary kernel writes, potentially leading to a sandbox escape. 
CVE-2025-22226  7.1  A high-severity information disclosure vulnerability in VMware ESXi, Workstation, and Fusion that allows a threat actor with administrative privileges on a virtual machine to leak memory from the VMX process via an out-of-bounds read in the Host Guest File System (HGFS). 

 

Details of the exploitation have not been revealed at this time, and Arctic Wolf has not identified a public Proof-of-Concept (PoC) exploit. While these vulnerabilities require specific privileges for exploitation, threat actors have historically targeted ESXi, Workstation, and Fusion, with several vulnerabilities listed in CISA’s Known Exploited Vulnerabilities catalog. 

Recommendation 

Upgrade to Latest Fixed Version

Arctic Wolf strongly recommends that customers upgrade to the latest patched version of their respective VMware product. 

Product  Vulnerability  Affected Version  Fixed Version 
VMware ESXi 
  • CVE-2025-22224 
  • CVE-2025-22225 
  • CVE-2025-22226 
  • 8.0 
  • 7.0 
VMware Workstation 
  • CVE-2025-22224 
  • CVE-2025-22226 
  • 17.x 
  • 17.6.3 
VMware Fusion 
  • CVE-2025-22226 
  • 13.x 
  • 13.6.3 
VMware Cloud Foundation 
  • CVE-2025-22224 
  • CVE-2025-22225 
  • CVE-2025-22226 
  • 5.x 
  • 4.5.x 
VMware Telco Cloud Platform 
  • CVE-2025-22224 
  • CVE-2025-22225 
  • CVE-2025-22226 
  • 5.x 
  • 4.x 
  • 3.x 
  • 2.x 
VMware Telco Cloud Infrastructure 
  • CVE-2025-22224 
  • CVE-2025-22225 
  • CVE-2025-22226 
  • 3.x 
  • 2.x 

 

Please follow your organization’s patching and testing guidelines to minimize potential operational impact. 

References 

Resources

Understand the threat landscape, and how to better defend your organization, with the 2025 Arctic Wolf Threat Report

See how Arctic Wolf utilizes threat intelligence to harden your attack surface and stop threats earlier and faster

Share this post: