9.3 CVE-2025-22224
CISA Kev Catalog
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
https://nvd.nist.gov/vuln/detail/CVE-2025-22224
Categories
CWE-367 : Time-of-check Time-of-use (TOCTOU) Race Condition
This weakness can be security-relevant when an attacker can influence the state of the resource between check and use. This can happen with shared resources such as files, memory, or even variables in multithreaded programs.
References
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:* | ||
cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* | >= 17.0 | < 17.6.3 |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
27 | Leveraging Race Conditions via Symbolic Links |
High |
29 | Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions |
High |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.
