VMSA-2025-0004: VMware ESXi, Workstation, and Fusion updates address multiple vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226)
25390
04 March 2025
04 March 2025
OPEN
CRITICAL
7.1-9.3
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226
Advisory ID: | VMSA-2025-0004 |
Severity: | Critical |
CVSSv3 Range: | 7.1-9.3 |
Synopsis: | VMware ESXi, Workstation, and Fusion updates address multiple vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) |
Issue date: | 2025-03-04 |
Updated on: | 2025-03-04 (Initial Advisory) |
CVE(s) | CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 |
1. Impacted Products
- VMware ESXi
- VMware Workstation Pro / Player (Workstation)
- VMware Fusion
- VMware Cloud Foundation
- VMware Telco Cloud Platform
2. Introduction
Multiple vulnerabilities in VMware ESXi, Workstation, and Fusion were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.
3a. VMCI heap-overflow vulnerability (CVE-2025-22224)
Description:
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.3.
Known Attack Vectors:
A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Resolution:
To remediate CVE-2025-22224 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.
Workarounds:
None.
Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0004
Acknowledgements:
VMware would like to thank Microsoft Threat Intelligence Center for reporting this issue to us.
Notes:
VMware by Broadcom has information to suggest that exploitation of CVE-2025-22224 has occurred in the wild.
3b. VMware ESXi arbitrary write vulnerability (CVE-2025-22225)
Description:
VMware ESXi contains an arbitrary write vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.2.
Known Attack Vectors:
A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
Resolution:
To remediate CVE-2025-22225 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.
Workarounds:
None.
Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0004
Acknowledgements:
VMware would like to thank Microsoft Threat Intelligence Center for reporting this issue to us.
Notes:
VMware by Broadcom has information to suggest that exploitation of CVE-2025-22225 has occurred in the wild.
3c. HGFS information-disclosure vulnerability (CVE-2025-22226)
Description:
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.1.
Known Attack Vectors:
A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
Resolution:
To remediate CVE-2025-22226 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.
Workarounds:
None.
Additional Documentation:
A supplemental FAQ was created for clarification. Please see: https://brcm.tech/vmsa-2025-0004
Acknowledgements:
VMware would like to thank Microsoft Threat Intelligence Center for reporting this issue to us.
Notes:
VMware by Broadcom has information to suggest that exploitation of CVE-2025-22226 has occurred in the wild.
Response Matrix:
VMware Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
VMware ESXi | 8.0 | Any | CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 | 9.3, 8.2, 7.1 | Critical | ESXi80U3d-24585383 | None | FAQ |
VMware ESXi | 8.0 | Any | CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 | 9.3, 8.2, 7.1 | Critical | ESXi80U2d-24585300 | None | FAQ |
VMware ESXi | 7.0 | Any | CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 | 9.3, 8.2, 7.1 | Critical | ESXi70U3s-24585291 | None | FAQ |
VMware Workstation | 17.x | Any |
CVE-2025-22224, CVE-2025-22226 |
9.3, 7.1 | Critical | 17.6.3 | None | FAQ |
VMware Fusion | 13.x | Any |
CVE-2025-22226 |
7.1 | Important | 13.6.3 | None | FAQ |
VMware Cloud Foundation | 5.x | Any |
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 |
9.3, 8.2, 7.1 | Critical | Async patch to ESXi80U3d-24585383 | None | Async Patching Guide: KB88287 |
VMware Cloud Foundation | 4.5.x | Any |
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 |
9.3, 8.2, 7.1 | Critical | Async patch to ESXi70U3s-24585291 | None | Async Patching Guide: KB88287 |
VMware Telco Cloud Platform | 5.x, 4.x, 3.x, 2.x | Any |
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 |
9.3, 8.2, 7.1 | Critical | KB389385 | None | FAQ |
VMware Telco Cloud Infrastructure | 3.x, 2.x | Any |
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226 |
9.3, 8.2, 7.1 | Critical | KB389385 | None | FAQ |
4. References:
VMware ESXi 8.0 ESXi80U3d-24585383
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5773
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3d-release-notes.html
VMware ESXi 8.0 ESXi80U2d-24585300
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5772
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html
VMware ESXi 7.0 ESXi70U3s-24585291
Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5771
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3s-release-notes.html
VMware Workstation 17.6.3
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Workstation%20Pro&displayGroup=VMware%20Workstation%20Pro%2017.0%20for%20Windows&release=17.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Workstation%20Pro&displayGroup=VMware%20Workstation%20Pro%2017.0%20for%20Linux&release=17.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/workstation-pro/17-0/release-notes/vmware-workstation-1763-pro-release-notes.html
VMware Fusion 13.6.3
Downloads and Documentation:
https://support.broadcom.com/group/ecx/productfiles?subFamily=VMware%20Fusion&displayGroup=VMware%20Fusion%2013&release=13.6.3&os=&servicePk=undefined&language=EN&freeDownloads=true
https://techdocs.broadcom.com/us/en/vmware-cis/desktop-hypervisors/fusion-pro/13-0/release-notes/vmware-fusion-1363-release-notes.html
VMware Cloud Foundation 5.x, 4.5.x
Downloads and Documentation:
https://knowledge.broadcom.com/external/article?legacyId=88287
Telco Cloud Platform 5.x, 4.x, 3.x
Downloads and Documentation:
https://techdocs.broadcom.com/us/en/vmware-sde/telco-cloud/vmware-telco-cloud-platform/5-0/Chunk77140612.html
https://techdocs.broadcom.com/us/en/vmware-sde/telco-cloud/vmware-telco-cloud-platform/4-0/vmware-telco-cloud-platform-401-release-notes.html
https://techdocs.broadcom.com/us/en/vmware-sde/telco-cloud/vmware-telco-cloud-platform/3-1/Chunk1587463997.html#Chunk1587463997
Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22224
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22225
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-22226
FIRST CVSSv3 Calculator:
CVE-2025-22224: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CVE-2025-22225: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2025-22226: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
5. Change Log:
2025-03-04 VMSA-2025-0004
Initial security advisory.
6. Contact:
E-mail: [email protected]
PGP key
https://knowledge.broadcom.com/external/article/321551
VMware Security Advisories
https://www.broadcom.com/support/vmware-security-advisories
VMware External Vulnerability Response and Remediation Policy
https://www.broadcom.com/support/vmware-services/security-response
VMware Lifecycle Support Phases
https://support.broadcom.com/group/ecx/productlifecycle
VMware Security Blog
https://blogs.vmware.com/security
Copyright 2025 Broadcom. All rights reserved.