VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Metrics
Affected Vendors & Products
References
History
Tue, 21 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware cloud Foundation
Vmware telco Cloud Infrastructure Vmware telco Cloud Platform |
|
| CPEs | cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:* |
|
| Vendors & Products |
Vmware cloud Foundation
Vmware telco Cloud Infrastructure Vmware telco Cloud Platform |
|
| References |
|
Tue, 04 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Tue, 04 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-367 | |
| Metrics |
ssvc
|
Tue, 04 Mar 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published: 2025-03-04T11:56:12.317Z
Updated: 2025-10-21T22:55:28.319Z
Reserved: 2025-01-02T04:29:30.445Z
Link: CVE-2025-22224
Updated: 2025-03-04T13:47:31.281Z
Status : Modified
Published: 2025-03-04T12:15:33.687
Modified: 2025-10-21T23:16:50.013
Link: CVE-2025-22224
No data.
ReportizFlow