VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
References
Link | Resource |
---|---|
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
10 Apr 2025, 19:19
Type | Values Removed | Values Added |
---|---|---|
First Time |
Vmware
Vmware telco Cloud Platform Vmware esxi Vmware cloud Foundation Vmware telco Cloud Infrastructure |
|
CWE | CWE-787 | |
Summary |
|
|
CPE | cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:* |
|
References | () https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 - Vendor Advisory |
04 Mar 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-123 |
04 Mar 2025, 12:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-03-04 12:15
Updated : 2025-04-10 19:19
NVD link : CVE-2025-22225
Mitre link : CVE-2025-22225
CVE.ORG link : CVE-2025-22225
JSON object : View
Products Affected
vmware
- telco_cloud_platform
- esxi
- telco_cloud_infrastructure
- cloud_foundation