VMSA-2025-0004: VMware ESXi, Workstation, and Fusion updates address multiple vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226)

VMware Cloud Foundation

4 more products

25390

04 March 2025

04 March 2025

OPEN

CRITICAL

7.1-9.3

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

 

Advisory ID:  VMSA-2025-0004
Severity: Critical
CVSSv3 Range: 7.1-9.3
Synopsis: VMware ESXi, Workstation, and Fusion updates address multiple vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226)
Issue date: 2025-03-04
Updated on: 2025-03-04 (Initial Advisory)
CVE(s) CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

 

1. Impacted Products

  • VMware ESXi
  • VMware Workstation Pro / Player (Workstation)
  • VMware Fusion
  • VMware Cloud Foundation
  • VMware Telco Cloud Platform

2. Introduction

Multiple vulnerabilities in VMware ESXi, Workstation, and Fusion were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products. 

3a. VMCI heap-overflow vulnerability (CVE-2025-22224) 

Description: 
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.3.

Known Attack Vectors:
A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. 

Resolution: 
To remediate CVE-2025-22224 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds:
None.

Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0004

Acknowledgements:
VMware would like to thank Microsoft Threat Intelligence Center for reporting this issue to us.

Notes:
VMware by Broadcom has information to suggest that exploitation of CVE-2025-22224 has occurred in the wild.

3b. VMware ESXi arbitrary write vulnerability (CVE-2025-22225) 

Description: 
VMware ESXi contains an arbitrary write vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.2.

Known Attack Vectors:
A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

Resolution: 
To remediate CVE-2025-22225 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds:
None.

Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0004

Acknowledgements:
VMware would like to thank Microsoft Threat Intelligence Center for reporting this issue to us.

Notes:
VMware by Broadcom has information to suggest that exploitation of CVE-2025-22225 has occurred in the wild.

3c. HGFS information-disclosure vulnerability (CVE-2025-22226)

Description: 
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.1.

Known Attack Vectors:
A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process. 

Resolution: 
To remediate CVE-2025-22226 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds:
None.

Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0004

Acknowledgements:
VMware would like to thank Microsoft Threat Intelligence Center for reporting this issue to us.

Notes:
VMware by Broadcom has information to suggest that exploitation of CVE-2025-22226 has occurred in the wild.

Response Matrix:

VMware Product Version Running On CVE CVSSv3 Severity Fixed Version Workarounds Additional Documentation
VMware ESXi 8.0 Any CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 9.3, 8.2, 7.1 Critical ESXi80U3d-24585383 None FAQ
VMware ESXi 8.0 Any CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 9.3, 8.2, 7.1 Critical ESXi80U2d-24585300 None FAQ
VMware ESXi 7.0  Any CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 9.3, 8.2, 7.1 Critical ESXi70U3s-24585291 None FAQ
VMware Workstation 17.x Any

CVE-2025-22224,  CVE-2025-22226

9.3, 7.1 Critical 17.6.3 None FAQ
VMware Fusion 13.x Any

CVE-2025-22226

 7.1 Important 13.6.3 None FAQ
VMware Cloud Foundation  5.x Any

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

9.3, 8.2, 7.1 Critical Async patch to ESXi80U3d-24585383 None Async Patching Guide: KB88287
VMware Cloud Foundation  4.5.x Any

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

9.3, 8.2, 7.1 Critical Async patch to ESXi70U3s-24585291 None Async Patching Guide: KB88287
VMware Telco Cloud Platform 5.x, 4.x, 3.x, 2.x Any

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

9.3, 8.2, 7.1 Critical KB389385 None FAQ
VMware Telco Cloud Infrastructure 3.x, 2.x  Any

CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

9.3, 8.2, 7.1 Critical KB389385 None FAQ

 

4. References:

VMware ESXi 8.0 ESXi80U3d-24585383
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5773
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3d-release-notes.html

VMware ESXi 8.0 ESXi80U2d-24585300
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5772
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html

VMware ESXi 7.0 ESXi70U3s-24585291
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5771
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3s-release-notes.html

VMware Workstation 17.6.3
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Workstation%20Pro&displayGroup=VMware%20Workstation%20Pro%2017.0%20for%20Windows&release=17.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Workstation%20Pro&displayGroup=VMware%20Workstation%20Pro%2017.0%20for%20Linux&release=17.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/workstation-pro/17-0/release-notes/vmware-workstation-1763-pro-release-notes.html

VMware Fusion 13.6.3
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Fusion&displayGroup=VMware%20Fusion%2013&release=13.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/fusion-pro/13-0/release-notes/vmware-fusion-1363-release-notes.html

VMware Cloud Foundation 5.x, 4.5.x
Downloads and Documentation:
https://knowledge.broadcom.com/external/article?legacyId=88287

Telco Cloud Platform 5.x, 4.x, 3.x
Downloads and Documentation:
https://techdocs.broadcom.com/us/en/vmware-sde/telco-cloud/vmware-telco-cloud-platform/5-0/Chunk77140612.html
https://techdocs.broadcom.com/us/en/vmware-sde/telco-cloud/vmware-telco-cloud-platform/4-0/vmware-telco-cloud-platform-401-release-notes.html
https://techdocs.broadcom.com/us/en/vmware-sde/telco-cloud/vmware-telco-cloud-platform/3-1/Chunk1587463997.html#Chunk1587463997

Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22224 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22225 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22226 

FIRST CVSSv3 Calculator:
CVE-2025-22224: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H 
CVE-2025-22225: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2025-22226: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

5. Change Log:

2025-03-04 VMSA-2025-0004
Initial security advisory.

6. Contact:

E-mail: [email protected]

PGP key
https://knowledge.broadcom.com/external/article/321551

VMware Security Advisories
https://www.broadcom.com/support/vmware-security-advisories

VMware External Vulnerability Response and Remediation Policy
https://www.broadcom.com/support/vmware-services/security-response

VMware Lifecycle Support Phases
https://support.broadcom.com/group/ecx/productlifecycle

VMware Security Blog
https://blogs.vmware.com/security

X
https://x.com/VMwareSRC

Copyright 2025 Broadcom. All rights reserved.