VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 04 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-03-04'}


Tue, 04 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-367
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Mar 2025 12:00:00 +0000

Type Values Removed Values Added
Description VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2025-07-30T01:36:18.856Z

Reserved: 2025-01-02T04:29:30.445Z

Link: CVE-2025-22224

cve-icon Vulnrichment

Updated: 2025-03-04T13:47:31.281Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-03-04T12:15:33.687

Modified: 2025-03-05T02:00:02.390

Link: CVE-2025-22224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-06-17T12:08:35Z