The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed that ransomware operators are actively exploiting a high‑severity VMware ESXi sandbox‑escape vulnerability, tracked as CVE‑2025‑22225. The flaw enables attackers with VMX‑level privileges to perform arbitrary kernel writes, escape VM isolation, and seize control of the underlying ESXi host.
Broadcom issued patches for this vulnerability in March 2025 as part of advisory VMSA‑2025‑0004, which also remediated two related zero‑day issues (CVE‑2025‑22224 and CVE‑2025‑22226). CISA has since added CVE‑2025‑22225 to its Known Exploited Vulnerabilities (KEV) catalog and confirmed that it is being weaponized in active ransomware campaigns. Under BOD 22‑01, federal agencies were required to remediate affected systems by March 25, 2025.
Affected Products
Per Broadcom’s advisory, the following VMware platforms contain impacted VMX‑related components:
Threat Summary & Environment Impact
Threat actors—including clusters assessed to be aligned with Chinese state operations—have been chaining CVE‑2025‑22225 with related vulnerabilities in active campaigns since at least early 2024. In practice, these exploit chains have enabled:
Reliable full VM sandbox escape
Hypervisor‑level compromise of ESXi hosts
Fast, wide‑scale ransomware deployment across multiple workloads in parallel
Successful exploitation enables attackers to:
1. Apply Broadcom Security Patches Immediately
2. Follow CISA BOD 22‑01 Guidance
3. Restrict Privileged Access
4. Harden ESXi Hosts
5. Monitor for Hypervisor‑Level Anomalies
Use EDR/XDR platforms capable of ESXi telemetry. Monitor for:
6. Enforce Network Isolation
7. Validate and Test Backups
1. Isolate the Host
2. Collect Forensic Evidence
3. Eradication
4. Restore from Known‑Good Backups
5. Post‑Incident Hardening
Bottom Line:
CVE‑2025‑22225 represents a critical threat because it enables compromise of the hypervisor itself, giving attackers the ability to control entire virtualized environments. With confirmed ransomware campaigns actively abusing this flaw, organizations running VMware ESXi must treat patching, configuration hardening, and access control around their hypervisors as an immediate, top‑priority operational requirement.
Sources:
Recent Ransomware Variants
|
|
Recent Engagement Types
|
|
Contact us today to learn more about our Digital Forensics and Incident Response (DFIR) services.