⚠ Actively exploited
Added to CISA KEV on 2025-03-04. Federal agencies required to patch by 2025-03-25. Required action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable..
CVE-2025-22224 — Time-of-check Time-of-use (TOCTOU) Race Condition in Vmware Esxi
Severity
8.2HIGHNVD
CNA9.3VulnCheck9.3
EPSS
47.3%
top 2.30%
CISA KEV
KEV
Added 2025-03-04
Due 2025-03-25
Exploit
No known exploits
Affected products
Timeline
PublishedMar 4
KEV addedMar 4
KEV dueMar 25
Latest updateFeb 4
CISA Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Description
VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:HExploitability: 1.5 | Impact: 6.0
Affected Packages9 packages
🔴Vulnerability Details
3CVEList▶
CVE-2025-22224: VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write↗2025-03-04
GHSA▶
GHSA-j652-46fv-w96g: VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write↗2025-03-04