
Broadcom has released security updates to address three proactively leveraged security flaws: VMware ESXI, workstations, and fusion products that can lead to code execution and disclosure.
Here’s the list of vulnerabilities –
CVE-2025-22224 (CVSS score: 9.3) – Time-of-use (Toctou) vulnerability leading to unbound writing allows malicious actors with local management privileges on virtual machines to run code as Virtual Machine VMX processes running Virtual Machine VMX processes. arbitrary natural write vulnerability that allows a malicious actor with privileges within a VMX process to exploit sandbox escape CVE-2025-22226 (CVSS score: 7.1) – HGFS-read disclosure vulnerability that allows malicious actors using machines using VARTIOL machines to extend to varsh machines

The drawbacks affect the following versions –
VMware ESXI 8.0 -ESXI80U3D -24585383, ESXI80U2D -24585300 VMware ESXI 7.0- ESXI70U3S -24585291 VMware Workstation 17.x -17.6.6.6.6.6.6.6 Fixed 17.x- ESXI80U3D -24585383 VMware Cloud Foundation 4.x -Async Patch to ESXI70U3S -24585291 VMware Telco Cloud Platform 5.x, 4.x, 3.x, 2.x -ESXI 7.0U3S, ESXI 8.0U2D, and ESXI 8.0U3D VMWare Telco Telco Cloud Intucuure 3.X, ESXI 8.0U3D VMWare Telra 7.0U3S
In another FAQ, Broadcom admitted that “there is information that suggests that the exploitation of these issues occurred in the ‘wild’, but did not elaborate on the nature of the attacks or the identity of the threat actors who weaponized them.
The Virtualization Services Provider was praised by the Microsoft Threat Intelligence Center for discovering and reporting a bug. In light of aggressive exploitation, it is essential that users apply the latest patches for optimal protection.
Source link