Ransomware attackers exploiting CVE-2025-22225, a VMware ESXi arbitrary write vulnerability, in ransomware campaigns. This has been confirmed by CISA last week and researchers found that all supported and unsupported VMware products are impacted, including VMware ESXi, VMware Workstation Pro / Player (Workstation), VMware Fusion, VMware Cloud Foundation, and VMware Telco Cloud Platform.
CISA updated the vulnerability’s entry in its Known Exploited Vulnerabilities (KEV) catalog which confirms its importance in category of high importance. Also CISA ordered federal agencies to secure their systems by March 25, 2025, as mandated by Binding Operational Directive (BOD) 22-01.
Key findings
Threat analysis
As per cyber security firm Huntress , threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as far back as February 2024. They observed threat actors activity in December 2025. According to them it was a attack that can be grouped in a ransomware attack.
They found the attack exploited three VMware vulnerabilities, that were disclosed as zero-days by Broadcom in March 2025: CVE-2025-22224 (CVSS score: 9.3), CVE-2025-22225 (CVSS score: 8.2), and CVE-2025-22226 (CVSS score: 7.1).
Successful exploitation of the issue could permit a malicious actor with admin privileges to leak memory from the Virtual Machine Executable (VMX) process or execute code as the VMX process.
As per Bleeping computers, the attack exploited three VMware vulnerabilities, that were disclosed as zero-days by Broadcom in March 2025: CVE-2025-22224 (CVSS score: 9.3), CVE-2025-22225 (CVSS score: 8.2), and CVE-2025-22226 (CVSS score: 7.1).
Successful exploitation of the issue could permit a malicious actor with admin privileges to leak memory from the Virtual Machine Executable (VMX) process or execute code as the VMX process.
Alert of organizations
If the three vulnerabilities 3 can be linked together what can be the outcomes.
Incident of such kind allows an attacker to escape the main area target. Here it is Virtual Machine (VM) then gain access to previous ESXi Hypervisor and subsequently access other VM based management network of the exposed VMware cluster.
Sources: https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/
Recent Comments