Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
VMware Fusion Vulnerability Let Attackers Escalate Privilege to Root
May 15, 2026
Hackers Abuse Scheduled Tasks for FrostyNeighbor Persistence
May 15, 2026
79 Chrome Vulnerabilities Patched, Including 14 Critical One’s
May 15, 2026
Home/CyberSecurity News/CISA Warns: VMware ESXi 0- Vulnerability Exploited
CyberSecurity News

CISA Warns: VMware ESXi 0- Vulnerability Exploited

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed active exploitation of CVE-2025-22225, a high-severity VMware ESXi sandbox escape vulnerability, by ransomware groups....

Sarah simpson
Sarah simpson
February 5, 2026 2 Min Read
4 0

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has confirmed active exploitation of CVE-2025-22225, a high-severity VMware ESXi sandbox escape vulnerability, by ransomware groups.

This flaw, patched by Broadcom in March 2025, enables attackers to escape virtual machine isolation and deploy ransomware across hypervisors.

CVE-2025-22225 is an arbitrary write vulnerability in VMware ESXi, rated Important with a CVSS score of 8.2. A malicious actor with privileges in the VMX process can trigger an arbitrary kernel write, breaking out of the sandbox to gain hypervisor control.

It was disclosed alongside two other zero-days, CVE-2025-22224 (CVSS 9.3, heap overflow) and CVE-2025-22226 (CVSS 7.1, info disclosure), all exploited in the wild since at least early 2025.

CVE ID CVSS Score Description Affected Products
CVE-2025-22224 9.3 Heap overflow in VMCI driver ESXi 7.0, 8.0; Workstation 17.0
CVE-2025-22225 8.2 Arbitrary kernel write via VMX ESXi 7.0, 8.0
CVE-2025-22226 7.1 HGFS memory leak ESXi, Workstation, Fusion

CISA added CVE-2025-22225 to its Known Exploited Vulnerabilities (KEV) catalog on March 4, 2025, mandating federal patches by March 25 under BOD 22-01.

Recent updates on February 3, 2026, flagged its use in ransomware campaigns, though specifics on groups remain undisclosed. Attackers chain it with the other flaws for full VM escape, targeting enterprise hypervisors that store sensitive data.

Ransomware actors leverage initial VM compromise often via admin access to disable VMCI drivers, load unsigned kernel drivers, and leak VMX memory for ASLR bypass.

This deploys stealthy backdoors like VSOCKpuppet for persistent hypervisor control, evading network monitoring. Earlier, Chinese-linked hackers exploited the chain since February 2024 via compromised SonicWall VPNs, staging data exfiltration and ransomware prep.

Broadcom’s VMSA-2025-0004 advisory confirmed in-the-wild exploitation at patch release. Scans reveal over 41,500 exposed ESXi instances remain vulnerable, amplifying ransomware risks. Huntress reported a toolkit targeting 155 ESXi builds, with PDB paths indicating development over a year prior.

Apply Broadcom patches immediately for ESXi 7.0/8.0 and related products. Follow CISA’s guidance: implement vendor mitigations, BOD 22-01 for cloud, or discontinue unpatchable systems. Enhance defenses with EDR monitoring for VMX anomalies, restrict VM admin privileges, and scan for IOCs like unsigned drivers or VSOCK traffic.

VMware ESXi’s ubiquity in enterprises makes it a prime ransomware vector, as seen in prior campaigns. Organizations should prioritize hypervisor patching amid rising state-sponsored and cybercrime threats. Unpatched systems risk full infrastructure encryption and data theft.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

CVECybersecurityExploitHackerPatchransomwareSecurityThreatVulnerabilityzero-day

Share Article

Sarah simpson

Sarah simpson

Sarah is a cybersecurity journalist specializing in threat intelligence and malware analysis. With over 8 years of experience covering APT groups, zero-day exploits, and advanced persistent threats, Sarah brings deep technical expertise to breaking cybersecurity news. Previously, she worked as a security researcher at leading threat intelligence firms, where she analyzed malware samples and tracked cybercriminal operations. Sarah holds a Master's degree in Computer Science with a focus on cybersecurity and is a regular contributor to major security conferences.

Previous Post

PhantomVAI Custom Loader Attacks Users with RunPE Uses Utility

Next Post

TP-Link OS Command Injection Flaws Give Attackers Admin

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
OpenAI Confirms Security Breach from TanStack npm Attack
May 15, 2026
Cisco Catalyst SD-WAN Controller 0-Day Actively Exploited to Gain
May 15, 2026
Chinese APT Exploits Microsoft Exchange to Breach Energy Networks
May 14, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us