Skip to content

Secure IT

Stay Secure. Stay Informed.

Primary Menu
  • Home
  • Sources
    • Krebs On Security
    • Security Week
    • The Hacker News
    • Schneier On Security
  • Home
  • Security Week
  • Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks
  • Security Week

Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks

Eduard Kovacs Published: March 6, 2025 | Updated: March 6, 2025 3 min read
0 views

Scans show that tens of thousands of VMware ESXi instances are affected by the vulnerabilities disclosed recently as zero-days.

On March 4, VMware owner Broadcom informed ESXi, Workstation, and Fusion customers about the availability of patches for three zero-days exploited in the wild. Their exploitation can lead to arbitrary code execution, sandbox escapes, and memory leaks. 

The flaws are tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and they can allow attackers with elevated privileges to perform a VM escape.

“This is a situation where an attacker who has already compromised a virtual machine’s guest OS and gained privileged access (administrator or root) could move into the hypervisor itself,” Broadcom explained.

The company has credited Microsoft Threat Intelligence Center for reporting the vulnerabilities — Microsoft likely also saw the attacks exploiting the zero-days — but neither Broadcom nor Microsoft have shared any information on the attacks. 

The cybersecurity agency CISA has added the flaws to its Known Exploited Vulnerabilities (KEV) catalog, which now includes nearly 30 VMware product vulnerabilities. 

Netlas has reported seeing more than 7,000 internet-exposed VMware ESXi instances that appear to be impacted by the vulnerabilities. 

The Shadowserver Foundation has reported seeing more than 41,000 vulnerable ESXi instances, a majority in China, France, the US, Germany, Iran, Brazil and South Korea. 

Advertisement. Scroll to continue reading.

The scans conducted by Shadowserver target CVE-2025-22224, but these instances are likely affected by the other vulnerabilities as well since they all impact the same software versions. 

Technical details and a PoC exploit do not appear to be available for CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226 — this would make it easier for more threat actors to exploit the vulnerabilities — giving organizations more time to install the patches before widespread exploitation commences. 

Security researcher Kevin Beaumont, who has dubbed the vulnerabilities ESXicape, explained, “Once you have ESX access, you can access everything on the ESX server — which includes things such as VM data, and crucially ESX config and mounted storage. Using ESX config and mounted network storage, you can traverse the VMware environment.”

Beaumont added, “For example, orgs use vMotion to allow virtual machines to automatically move across ESX hosts, to balance load and allow for maintenance without downtime (it’s how VMware security patching works). Because of this, a threat actor has direct access to storage of VMs both on and not on that host by design — they’re basically loose on the backend.”

According to the researcher, threat actors could use the vulnerabilities to get past security products and gain access to valuable assets such as Active Directory domain controller databases without triggering alerts. This could be useful in ransomware attacks.

“This is frequently seen in ransomware incidents, where people directly exploit the ESX server or vCenter server over the VMware management network using unpatched vulnerabilities. Once they reach ESX, they reach directly into storage across the whole cluster,” Beaumont said, adding, “However, being able to reach the ESX server hypervisor directly from the Virtual Machine significantly raises the risk. For example, you don’t need to find the ESX server details, or reach a segregated network.”

Beaumont pointed out that a hacker recently offered to sell an ESXi VM escape exploit for $150,000, but it’s unclear if that was a genuine exploit and whether it’s related to the zero-day attacks disclosed this week. 

Related: VMware Patches High-Risk Flaws in Oft-Targeted Aria Operations Products

Related: VMware Struggles to Fix Flaw Exploited at Chinese Hacking Contest

Related: VMware Discloses Exploitation of Hard-to-Fix vCenter Server Flaw

About The Author

Eduard Kovacs

See author's posts

Original post here

What do you feel about this?

  • Security Week

Post navigation

Previous: U.S. Charges 12 Chinese Nationals in State-Backed Hacking Operations
Next: Over 1,000 WordPress Sites Infected with JavaScript Backdoors Enabling Persistent Attacker Access

Author's Other Posts

China Admitted to US That It Conducted Volt Typhoon Attacks: Report Treasury-Hacked-China.jpg

China Admitted to US That It Conducted Volt Typhoon Attacks: Report

April 11, 2025 0 0
GitHub Announces General Availability of Security Campaigns GitHub.jpeg

GitHub Announces General Availability of Security Campaigns

April 10, 2025 0 0
Nissan Leaf Hacked for Remote Spying, Physical Takeover Nissan-Leaf.png

Nissan Leaf Hacked for Remote Spying, Physical Takeover

April 10, 2025 0 0
Operations of Sensor Giant Sensata Disrupted by Ransomware Attack Ransomware-attacks.jpg

Operations of Sensor Giant Sensata Disrupted by Ransomware Attack

April 10, 2025 0 2

Related Stories

Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Insurance Firm Lemonade Says API Glitch Exposed Some Driver’s License Numbers

Ionut Arghire April 15, 2025 0 0
ransomware.jpeg
  • Security Week

Kidney Dialysis Services Provider DaVita Hit by Ransomware

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

Conduent Says Names, Social Security Numbers Stolen in Cyberattack

Ionut Arghire April 15, 2025 0 0
Cybersecurity_News-SecurityWeek.jpg
  • Security Week

2.6 Million Impacted by Landmark Admin, Young Consulting Data Breaches

Ionut Arghire April 15, 2025 0 0
VC-Funding_China-tech.jpg
  • Security Week

China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games

Associated Press April 15, 2025 0 0
Satellite-Link-Cybersecurity.jpg
  • Security Week

Blockchain, Quantum, and IoT Firms Unite to Secure Satellite Communications Against Quantum Threats

Kevin Townsend April 15, 2025 0 0

Trending Now

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1

Connect with Us

Social menu is not set. You need to create menu and assign it to Social Menu on Menu Settings.

Trending News

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill 1
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers SMS Phishers Pivot to Points, Taxes, Fake Retailers 2
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

December 4, 2025 0 0
India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse whatsapp-sim.jpg 3
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

December 2, 2025 0 0
Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera korean.jpg 4
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

December 2, 2025 0 1
GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools hacked.jpg 5
  • The Hacker News

GlassWorm Returns with 24 Malicious Extensions Impersonating Popular Developer Tools

December 2, 2025 0 0
Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools npm-mal.jpg 6
  • The Hacker News

Malicious npm Package Uses Hidden Prompt and Script to Evade AI Security Tools

December 2, 2025 0 1
Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks iran-hacking.jpg 7
  • The Hacker News

Iran-Linked Hackers Hits Israeli Sectors with New MuddyViper Backdoor in Targeted Attacks

December 2, 2025 0 0

You may have missed

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill
  • Uncategorized

Drones to Diplomas: How Russia’s Largest Private University is Linked to a $25M Essay Mill

Sean December 6, 2025 0 0
SMS Phishers Pivot to Points, Taxes, Fake Retailers
  • Uncategorized

SMS Phishers Pivot to Points, Taxes, Fake Retailers

Sean December 4, 2025 0 0
whatsapp-sim.jpg
  • The Hacker News

India Orders Messaging Apps to Work Only With Active SIM Cards to Prevent Fraud and Misuse

[email protected] The Hacker News December 2, 2025 0 0
korean.jpg
  • The Hacker News

Researchers Capture Lazarus APT’s Remote-Worker Scheme Live on Camera

[email protected] The Hacker News December 2, 2025 0 1
Copyright © 2026 All rights reserved. | MoreNews by AF themes.