{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-22224","assignerOrgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","state":"PUBLISHED","assignerShortName":"vmware","dateReserved":"2025-01-02T04:29:30.445Z","datePublished":"2025-03-04T11:56:12.317Z","dateUpdated":"2026-02-26T19:09:47.563Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"ESXi","vendor":"VMware","versions":[{"lessThan":"ESXi80U3d-24585383","status":"affected","version":"8.0","versionType":"custom"},{"lessThan":"ESXi80U2d-24585300","status":"affected","version":"8.0","versionType":"custom"},{"lessThan":"ESXi70U3s-24585291","status":"affected","version":"7.0","versionType":"custom"}]},{"defaultStatus":"unaffected","platforms":["Windows","Linux"],"product":"Workstation","vendor":"VMware","versions":[{"lessThan":"17.6.3","status":"affected","version":"17.x","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"VMware Cloud Foundation","vendor":"VMware","versions":[{"status":"affected","version":"5.x, 4.5.x"}]},{"defaultStatus":"unaffected","product":"Telco Cloud Platform","vendor":"VMware","versions":[{"status":"affected","version":"5.x, 4.x, 3.x, 2.x"}]},{"defaultStatus":"unaffected","product":"Telco Cloud Infrastructure","vendor":"VMware","versions":[{"status":"affected","version":"3.x, 2.x"}]}],"datePublic":"2025-03-04T11:33:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">VMware ESXi, and Workstation</span><span style=\"background-color: rgb(255, 255, 255);\">&nbsp;contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.&nbsp;</span>A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.<span style=\"background-color: rgb(255, 255, 255);\"><br><br></span><br>"}],"value":"VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":9.3,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"description":"Heap-overflow vulnerability","lang":"en"}]}],"providerMetadata":{"orgId":"dcf2e128-44bd-42ed-91e8-88f912c1401d","shortName":"vmware","dateUpdated":"2025-04-03T14:39:46.987Z"},"references":[{"url":"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"}],"source":{"discovery":"UNKNOWN"},"x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-22224","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-03-05T04:55:22.499570Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2025-03-04","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224"}}}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224","tags":["government-resource"]}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-367","description":"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition"}]}],"timeline":[{"time":"2025-03-04T00:00:00.000Z","lang":"en","value":"CVE-2025-22224 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T19:09:47.563Z"}}]}}