VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 21 Oct 2025 23:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Vmware cloud Foundation
Vmware telco Cloud Infrastructure
Vmware telco Cloud Platform
CPEs cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*
Vendors & Products Vmware cloud Foundation
Vmware telco Cloud Infrastructure
Vmware telco Cloud Platform
References

Tue, 04 Mar 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2025-03-04'}


Tue, 04 Mar 2025 16:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-367
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'active', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 04 Mar 2025 12:00:00 +0000

Type Values Removed Values Added
Description VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2025-10-21T22:55:28.319Z

Reserved: 2025-01-02T04:29:30.445Z

Link: CVE-2025-22224

cve-icon Vulnrichment

Updated: 2025-03-04T13:47:31.281Z

cve-icon NVD

Status : Analyzed

Published: 2025-03-04T12:15:33.687

Modified: 2025-10-30T19:52:49.873

Link: CVE-2025-22224

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-06-17T12:08:35Z