cve-2025-22224
Vulnerability from cvelistv5
Published
2025-03-04 11:56
Modified
2025-03-05 04:55
Severity ?
EPSS score ?
Summary
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | n/a | VMware ESXi |
Version: 8.0 < ESXi80U3d-24585383 Version: 8.0 < ESXi80U2d-24585300 Version: 7.0 < ESXi70U3s-24585291 |
|||||||||||||||||||||
|
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2025-03-04
Due date: 2025-03-25
Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Used in ransomware: Unknown
Notes: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22224
{ containers: { adp: [ { metrics: [ { other: { content: { id: "CVE-2025-22224", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "total", }, ], role: "CISA Coordinator", timestamp: "2025-03-04T00:00:00+00:00", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2025-03-04", reference: "https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json", }, type: "kev", }, }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-367", description: "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-05T04:55:21.375Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, timeline: [ { lang: "en", time: "2025-03-04T00:00:00+00:00", value: "CVE-2025-22224 added to CISA KEV", }, ], title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { defaultStatus: "unaffected", product: "VMware ESXi", vendor: "n/a", versions: [ { lessThan: "ESXi80U3d-24585383", status: "affected", version: "8.0", versionType: "custom", }, { lessThan: "ESXi80U2d-24585300", status: "affected", version: "8.0", versionType: "custom", }, { lessThan: "ESXi70U3s-24585291", status: "affected", version: "7.0", versionType: "custom", }, ], }, { defaultStatus: "unaffected", platforms: [ "Windows", "Linux", ], product: "VMware Workstation", vendor: "n/a", versions: [ { lessThan: "17.6.3", status: "affected", version: "17.x", versionType: "custom", }, ], }, { defaultStatus: "unaffected", product: "VMware Cloud Foundation", vendor: "n/a", versions: [ { status: "affected", version: "5.x, 4.5.x", }, ], }, { defaultStatus: "unaffected", product: "VMware Telco Cloud Platform", vendor: "n/a", versions: [ { status: "affected", version: "5.x, 4.x, 3.x, 2.x", }, ], }, { defaultStatus: "unaffected", product: "VMware Telco Cloud Infrastructure", vendor: "n/a", versions: [ { status: "affected", version: "3.x, 2.x", }, ], }, ], datePublic: "2025-03-04T11:33:00.000Z", descriptions: [ { lang: "en", supportingMedia: [ { base64: false, type: "text/html", value: "<span style=\"background-color: rgb(255, 255, 255);\">VMware ESXi, and Workstation</span><span style=\"background-color: rgb(255, 255, 255);\"> contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. </span>A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.<span style=\"background-color: rgb(255, 255, 255);\"><br><br></span><br>", }, ], value: "VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.", }, ], metrics: [ { cvssV3_1: { attackComplexity: "LOW", attackVector: "LOCAL", availabilityImpact: "HIGH", baseScore: 9.3, baseSeverity: "CRITICAL", confidentialityImpact: "HIGH", integrityImpact: "HIGH", privilegesRequired: "NONE", scope: "CHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", version: "3.1", }, format: "CVSS", scenarios: [ { lang: "en", value: "GENERAL", }, ], }, ], problemTypes: [ { descriptions: [ { description: "Heap-overflow vulnerability", lang: "en", }, ], }, ], providerMetadata: { dateUpdated: "2025-03-04T11:56:12.317Z", orgId: "dcf2e128-44bd-42ed-91e8-88f912c1401d", shortName: "vmware", }, references: [ { url: "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390", }, ], source: { discovery: "UNKNOWN", }, x_generator: { engine: "Vulnogram 0.2.0", }, }, }, cveMetadata: { assignerOrgId: "dcf2e128-44bd-42ed-91e8-88f912c1401d", assignerShortName: "vmware", cveId: "CVE-2025-22224", datePublished: "2025-03-04T11:56:12.317Z", dateReserved: "2025-01-02T04:29:30.445Z", dateUpdated: "2025-03-05T04:55:21.375Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", "vulnerability-lookup:meta": { cisa_known_exploited: { cveID: "CVE-2025-22224", cwes: "[\"CWE-367\"]", dateAdded: "2025-03-04", dueDate: "2025-03-25", knownRansomwareCampaignUse: "Unknown", notes: "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22224", product: "ESXi and Workstation", requiredAction: "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.", shortDescription: "VMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.", vendorProject: "VMware", vulnerabilityName: "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability", }, nvd: "{\"cve\":{\"id\":\"CVE-2025-22224\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2025-03-04T12:15:33.687\",\"lastModified\":\"2025-03-05T02:00:02.390\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.\"},{\"lang\":\"es\",\"value\":\"VMware ESXi y Workstation contienen una vulnerabilidad TOCTOU (Time-of-Check Time-of-Use) que provoca una escritura fuera de los límites. Un actor malintencionado con privilegios administrativos locales en una máquina virtual puede aprovechar este problema para ejecutar código como el proceso VMX de la máquina virtual que se ejecuta en el host.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.3,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":6.0}]},\"cisaExploitAdd\":\"2025-03-04\",\"cisaActionDue\":\"2025-03-25\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"VMware ESXi and Workstation TOCTOU Race Condition Vulnerability\",\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"references\":[{\"url\":\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390\",\"source\":\"security@vmware.com\"}]}}", vulnrichment: { containers: "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-22224\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-04T18:07:18.295811Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2025-03-04\", \"reference\": \"https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-03-04T00:00:00+00:00\", \"value\": \"CVE-2025-22224 added to CISA KEV\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-367\", \"description\": \"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-04T13:47:31.281Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"VMware ESXi\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"ESXi80U3d-24585383\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"ESXi80U2d-24585300\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"7.0\", \"lessThan\": \"ESXi70U3s-24585291\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"n/a\", \"product\": \"VMware Workstation\", \"versions\": [{\"status\": \"affected\", \"version\": \"17.x\", \"lessThan\": \"17.6.3\", \"versionType\": \"custom\"}], \"platforms\": [\"Windows\", \"Linux\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"n/a\", \"product\": \"VMware Cloud Foundation\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.x, 4.5.x\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"n/a\", \"product\": \"VMware Telco Cloud Platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.x, 4.x, 3.x, 2.x\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"n/a\", \"product\": \"VMware Telco Cloud Infrastructure\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.x, 2.x\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2025-03-04T11:33:00.000Z\", \"references\": [{\"url\": \"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"VMware ESXi, and Workstation\\u00a0contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"<span style=\\\"background-color: rgb(255, 255, 255);\\\">VMware ESXi, and Workstation</span><span style=\\\"background-color: rgb(255, 255, 255);\\\"> contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. </span>A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.<span style=\\\"background-color: rgb(255, 255, 255);\\\"><br><br></span><br>\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Heap-overflow vulnerability\"}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2025-03-04T11:56:12.317Z\"}}}", cveMetadata: "{\"cveId\": \"CVE-2025-22224\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-05T04:55:21.375Z\", \"dateReserved\": \"2025-01-02T04:29:30.445Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2025-03-04T11:56:12.317Z\", \"assignerShortName\": \"vmware\"}", dataType: "CVE_RECORD", dataVersion: "5.1", }, }, }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.