9.3 CVE-2025-22224

CISA Kev Catalog
 

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
https://nvd.nist.gov/vuln/detail/CVE-2025-22224

Categories

CWE-367 : Time-of-check Time-of-use (TOCTOU) Race Condition
This weakness can be security-relevant when an attacker can influence the state of the resource between check and use. This can happen with shared resources such as files, memory, or even variables in multithreaded programs.

References


 

CPE

cpe start end
Configuration 1
cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*
cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*
Configuration 2
cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* >= 17.0 < 17.6.3


REMEDIATION




EXPLOITS


Exploit-db.com

id description date
No known exploits

POC Github

Url
No known exploits

Other Nist (github, ...)

Url
No known exploits


CAPEC


Common Attack Pattern Enumerations and Classifications

id description severity
27 Leveraging Race Conditions via Symbolic Links
High
29 Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions
High