Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124
Physical Address
304 North Cardinal St.
Dorchester Center, MA 02124

A serious security concern is dominating virtualization news this month as a critical flaw affecting VMware ESXi servers has begun seeing active exploitation in the wild. System administrators and IT security teams need to act immediately to protect their infrastructure.
In early February 2026, CISA officially added CVE-2025-22225 to its Known Exploited Vulnerabilities catalog, confirming active exploitation by ransomware operators Help Net SecurityCyber Press. This vulnerability is part of a sophisticated attack chain that has been targeting VMware infrastructure since at least early 2025, with evidence suggesting development began even earlier.
Three critical vulnerabilities are being exploited together to achieve complete virtual machine escape and hypervisor compromise:
CVE-2025-22225 (CVSS 8.2 – Important Severity) An arbitrary write vulnerability allowing attackers to perform memory writes that lead to sandbox escape, enabling code execution on the ESXi host Cyber Press. This is the final stage that allows attackers to break out of the virtual machine and gain control of the underlying hypervisor.
CVE-2025-22224 (CVSS 9.3 – Critical Severity) A Time-of-Check Time-of-Use (TOCTOU) vulnerability in VMCI that leads to an out-of-bounds write, permitting code execution as the VMX process Security Affairs.
CVE-2025-22226 (CVSS 7.1 – Important Severity) An information disclosure vulnerability caused by an out-of-bounds read in the Host-Guest File System that allows memory leakage from the vmx process Huntress.
The vulnerabilities affect:
Broadcom (VMware’s parent company) released patches in March 2025 through advisory VMSA-2025-0004. All administrators must update to the following versions or later:
Download patches from: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390
CISA issued a Binding Operational Directive ordering all Federal Civilian Executive Branch agencies to identify, mitigate, or patch vulnerable VMware ESXi instances by March 25, 2025 Cyber Press. While this deadline has passed, it underscores the urgency for all organizations.
Watch for:
lsof -a command)