Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-22224 (GCVE-0-2025-22224)
Vulnerability from cvelistv5 – Published: 2025-03-04 11:56 – Updated: 2026-02-26 19:09- Heap-overflow vulnerability
| Vendor | Product | Version | |
|---|---|---|---|
| VMware | ESXi |
Affected:
8.0 , < ESXi80U3d-24585383
(custom)
Affected: 8.0 , < ESXi80U2d-24585300 (custom) Affected: 7.0 , < ESXi70U3s-24585291 (custom) |
|
| VMware | Workstation |
Affected:
17.x , < 17.6.3
(custom)
|
|
| VMware | VMware Cloud Foundation |
Affected:
5.x, 4.5.x
|
|
| VMware | Telco Cloud Platform |
Affected:
5.x, 4.x, 3.x, 2.x
|
|
| VMware | Telco Cloud Infrastructure |
Affected:
3.x, 2.x
|
CISA KEV
Known Exploited Vulnerability - GCVE BCP-07 Compliant
Exploited: Yes
Timestamps
Scope
Evidence
Type: Vendor Report
Signal: Successful Exploitation
Confidence: 80%
Source: cisa-kev
Details
| Cwes | CWE-367 |
|---|---|
| Feed | CISA Known Exploited Vulnerabilities Catalog |
| Product | ESXi and Workstation |
| Due Date | 2025-03-25 |
| Date Added | 2025-03-04 |
| Vendorproject | VMware |
| Vulnerabilityname | VMware ESXi and Workstation TOCTOU Race Condition Vulnerability |
| Knownransomwarecampaignuse | Unknown |
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-22224",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-05T04:55:22.499570Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2025-03-04",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-367",
"description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2026-02-26T19:09:47.563Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-03-04T00:00:00.000Z",
"value": "CVE-2025-22224 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ESXi",
"vendor": "VMware",
"versions": [
{
"lessThan": "ESXi80U3d-24585383",
"status": "affected",
"version": "8.0",
"versionType": "custom"
},
{
"lessThan": "ESXi80U2d-24585300",
"status": "affected",
"version": "8.0",
"versionType": "custom"
},
{
"lessThan": "ESXi70U3s-24585291",
"status": "affected",
"version": "7.0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"Windows",
"Linux"
],
"product": "Workstation",
"vendor": "VMware",
"versions": [
{
"lessThan": "17.6.3",
"status": "affected",
"version": "17.x",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "VMware Cloud Foundation",
"vendor": "VMware",
"versions": [
{
"status": "affected",
"version": "5.x, 4.5.x"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Telco Cloud Platform",
"vendor": "VMware",
"versions": [
{
"status": "affected",
"version": "5.x, 4.x, 3.x, 2.x"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Telco Cloud Infrastructure",
"vendor": "VMware",
"versions": [
{
"status": "affected",
"version": "3.x, 2.x"
}
]
}
],
"datePublic": "2025-03-04T11:33:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware ESXi, and Workstation\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\u0026nbsp;\u003c/span\u003eA malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host.\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "VMware ESXi, and Workstation\u00a0contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Heap-overflow vulnerability",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-03T14:39:46.987Z",
"orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"shortName": "vmware"
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
}
],
"source": {
"discovery": "UNKNOWN"
},
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"assignerShortName": "vmware",
"cveId": "CVE-2025-22224",
"datePublished": "2025-03-04T11:56:12.317Z",
"dateReserved": "2025-01-02T04:29:30.445Z",
"dateUpdated": "2026-02-26T19:09:47.563Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2025-22224",
"cwes": "[\"CWE-367\"]",
"dateAdded": "2025-03-04",
"dueDate": "2025-03-25",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390 ; https://nvd.nist.gov/vuln/detail/CVE-2025-22224",
"product": "ESXi and Workstation",
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"shortDescription": "VMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine\u0027s VMX process running on the host.",
"vendorProject": "VMware",
"vulnerabilityName": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability"
},
"epss": {
"cve": "CVE-2025-22224",
"date": "2026-05-15",
"epss": "0.47304",
"percentile": "0.97728"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-22224\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2025-03-04T12:15:33.687\",\"lastModified\":\"2025-10-30T19:52:49.873\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"VMware ESXi, and Workstation\u00a0contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host.\"},{\"lang\":\"es\",\"value\":\"VMware ESXi y Workstation contienen una vulnerabilidad TOCTOU (Time-of-Check Time-of-Use) que provoca una escritura fuera de los l\u00edmites. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que se ejecuta en el host.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":9.3,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":6.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.2,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.5,\"impactScore\":6.0}]},\"cisaExploitAdd\":\"2025-03-04\",\"cisaActionDue\":\"2025-03-25\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"VMware ESXi and Workstation TOCTOU Race Condition Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-367\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"F030A666-1955-438B-8417-5C294905399F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A790D41E-B398-4233-9EC7-CF5BE2BC3161\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7619C16-5306-4C4A-88E8-E80876635F66\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"238E7AF4-722B-423D-ABB1-424286B06715\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4DE8C7-72FB-4BEC-AD9E-378786295011\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E6DE184-35C8-4A13-91D4-4B43E9F0168C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3E3A02D-6C1E-4DE8-B845-60F53C056F32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"12D385F0-DB2B-4802-AD0E-31441DA056B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C202879-9230-4E1D-BAB8-4FB7CE4BBC24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC6DC107-5142-4155-A33B-D5BE72E9ED38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*\",\"matchCriteriaId\":\"39817170-5C45-4F8A-916D-81B7352055DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ADC3CFF-7415-46A5-817A-2F053B261E8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F831A7-544E-4B45-BA49-7F7A0234579C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*\",\"matchCriteriaId\":\"80A0DD2E-F1CC-413B-91F9-E3986011A0A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*\",\"matchCriteriaId\":\"C77771B2-BC64-47A5-B6DB-9CBCC4456B67\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DE9CE6-F6C0-47D2-B3AB-34852A8B9603\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*\",\"matchCriteriaId\":\"E75B2F03-702E-4359-9BB2-E234F1DC38C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACAA9494-5248-4B01-8BC1-C38AB615FFD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF12014B-BF2B-42EF-B70C-59CDA8E2176F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*\",\"matchCriteriaId\":\"F965D853-EE4A-41F5-840B-2D009ACC9754\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA7B7313-FF53-43C9-AF4D-B639053D3FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC3668A6-262B-42BF-9E90-28BAA9BB3347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA4E9185-44BA-41E6-8600-C8616E199334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*\",\"matchCriteriaId\":\"F50302BB-B950-4178-A109-358393E0A50A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCCA4A31-1291-4FB4-9FA5-D2CCD086D660\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*\",\"matchCriteriaId\":\"78604FE5-510F-4979-B2E3-D36B3083224A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A1A402A-9262-4B97-A0B7-E5AE045E394D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE44B379-9943-4DD1-8514-26F87482AFA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A797377-8945-4D75-AA68-A768855E5842\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"79D84D76-54BE-49E9-905C-7D65B4B42D68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F8767F7-7C3D-457D-9EAC-E8A30796F751\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"29AF8474-2D7A-4C5A-82B9-7A873AD90C2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"7781A2CA-D927-48CD-9932-AE42B7BA1EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*\",\"matchCriteriaId\":\"18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*\",\"matchCriteriaId\":\"360C1B71-5360-4379-B0DE-63BB8F5E6DA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED92209F-FBD6-43F9-9A15-3842B139FCC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B701151-1B57-4E2D-A9AB-586FACEA2385\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*\",\"matchCriteriaId\":\"4230B9AA-9E0C-4AE2-814D-8DD641394879\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2FA150B-93E4-44D2-BF6D-347085A95776\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"31A7BB38-3238-413E-9736-F1A165D40867\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E46A694-8698-4283-9E25-01F222B63E9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59B9476F-E5E7-46B6-AC38-4630D0933462\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A045567-2563-4539-8E95-361087CB7762\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D11103A7-6AB5-4E78-BE11-BC2A04A09F19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C5F01D7-2675-4D09-B52B-B02D0EF52AEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5F8D61F-6E8B-4EE3-91DE-EBA6FF7D289E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E94D58-26A0-4E84-8CAD-F8CDB6707642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC33D39A-5760-467E-8284-F4E5D8082BBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"448206AA-A023-4AA1-98FD-35BC2A2AB2B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F6E30F8-B977-40A5-9E45-89B5C5E59170\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6B84F65-2E52-4445-8F97-2729B84B18E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"17.0\",\"versionEndExcluding\":\"17.6.3\",\"matchCriteriaId\":\"3124246D-3287-4657-B40D-E7B80A44E7D7\"}]}]}],\"references\":[{\"url\":\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390\",\"source\":\"security@vmware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"US Government Resource\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-22224\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-03-05T04:55:22.499570Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2025-03-04\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-03-04T00:00:00.000Z\", \"value\": \"CVE-2025-22224 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-367\", \"description\": \"CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-03-04T13:47:31.281Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 9.3, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"VMware\", \"product\": \"ESXi\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"ESXi80U3d-24585383\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"ESXi80U2d-24585300\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"7.0\", \"lessThan\": \"ESXi70U3s-24585291\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"VMware\", \"product\": \"Workstation\", \"versions\": [{\"status\": \"affected\", \"version\": \"17.x\", \"lessThan\": \"17.6.3\", \"versionType\": \"custom\"}], \"platforms\": [\"Windows\", \"Linux\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"VMware\", \"product\": \"VMware Cloud Foundation\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.x, 4.5.x\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"VMware\", \"product\": \"Telco Cloud Platform\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.x, 4.x, 3.x, 2.x\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"VMware\", \"product\": \"Telco Cloud Infrastructure\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.x, 2.x\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2025-03-04T11:33:00.000Z\", \"references\": [{\"url\": \"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"VMware ESXi, and Workstation\\u00a0contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eVMware ESXi, and Workstation\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\u0026nbsp;\u003c/span\u003eA malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host.\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u003cbr\u003e\u003cbr\u003e\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Heap-overflow vulnerability\"}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2025-04-03T14:39:46.987Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-22224\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2026-02-26T19:09:47.563Z\", \"dateReserved\": \"2025-01-02T04:29:30.445Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2025-03-04T11:56:12.317Z\", \"assignerShortName\": \"vmware\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
GHSA-J652-46FV-W96G
Vulnerability from github – Published: 2025-03-04 12:30 – Updated: 2025-10-22 00:33VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
{
"affected": [],
"aliases": [
"CVE-2025-22224"
],
"database_specific": {
"cwe_ids": [
"CWE-367"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-03-04T12:15:33Z",
"severity": "CRITICAL"
},
"details": "VMware ESXi, and Workstation\u00a0contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host.",
"id": "GHSA-j652-46fv-w96g",
"modified": "2025-10-22T00:33:12Z",
"published": "2025-03-04T12:30:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22224"
},
{
"type": "WEB",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2025-AVI-0177
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
VMware indique que les vulnérabilités CVE-2025-222234, CVE-2025-22225 et CVE-2025-22226 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Cloud Foundation | VMware Cloud Foundation versions 4.5.x sans le correctif de sécurité ESXi70U3s-24585291 | ||
| VMware | Telco Cloud Platform | VMware Telco Cloud Platorm sans le correctif de sécurité KB389385 | ||
| VMware | ESXi | VMware ESXi versions 7.0 sans le correctif de sécurité ESXi70U3s-24585291 | ||
| VMware | Cloud Foundation | VMware Cloud Foundation versions 5.x sans le correctif de sécurité ESXi80U3d-24585383 | ||
| VMware | Fusion | VMware Fusion 13.x versions antérieures à 13.6.3 | ||
| VMware | ESXi | VMware ESXi versions 8.0 sans le correctif de sécurité ESXi80U2d-24585300 ou ESXi80U3d-24585383 | ||
| VMware | Telco Cloud Infrastructure | VMware Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB389385 | ||
| VMware | Workstation | VMware Workstation versions 17.x antérieures à 17.6.3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Cloud Foundation versions 4.5.x sans le correctif de s\u00e9curit\u00e9 ESXi70U3s-24585291",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Telco Cloud Platorm sans le correctif de s\u00e9curit\u00e9 KB389385",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 7.0 sans le correctif de s\u00e9curit\u00e9 ESXi70U3s-24585291",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Cloud Foundation versions 5.x sans le correctif de s\u00e9curit\u00e9 ESXi80U3d-24585383",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Fusion 13.x versions ant\u00e9rieures \u00e0 13.6.3",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 8.0 sans le correctif de s\u00e9curit\u00e9 ESXi80U2d-24585300 ou ESXi80U3d-24585383",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB389385",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Workstation versions 17.x ant\u00e9rieures \u00e0 17.6.3",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-22224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22224"
},
{
"name": "CVE-2024-38814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38814"
},
{
"name": "CVE-2025-22226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22226"
},
{
"name": "CVE-2025-22225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22225"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0177",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-03-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.\n\nVMware indique que les vuln\u00e9rabilit\u00e9s CVE-2025-222234, CVE-2025-22225 et CVE-2025-22226 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25466",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25466"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
}
]
}
CERTFR-2025-AVI-0177
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
VMware indique que les vulnérabilités CVE-2025-222234, CVE-2025-22225 et CVE-2025-22226 sont activement exploitées.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Cloud Foundation | VMware Cloud Foundation versions 4.5.x sans le correctif de sécurité ESXi70U3s-24585291 | ||
| VMware | Telco Cloud Platform | VMware Telco Cloud Platorm sans le correctif de sécurité KB389385 | ||
| VMware | ESXi | VMware ESXi versions 7.0 sans le correctif de sécurité ESXi70U3s-24585291 | ||
| VMware | Cloud Foundation | VMware Cloud Foundation versions 5.x sans le correctif de sécurité ESXi80U3d-24585383 | ||
| VMware | Fusion | VMware Fusion 13.x versions antérieures à 13.6.3 | ||
| VMware | ESXi | VMware ESXi versions 8.0 sans le correctif de sécurité ESXi80U2d-24585300 ou ESXi80U3d-24585383 | ||
| VMware | Telco Cloud Infrastructure | VMware Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de sécurité KB389385 | ||
| VMware | Workstation | VMware Workstation versions 17.x antérieures à 17.6.3 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Cloud Foundation versions 4.5.x sans le correctif de s\u00e9curit\u00e9 ESXi70U3s-24585291",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Telco Cloud Platorm sans le correctif de s\u00e9curit\u00e9 KB389385",
"product": {
"name": "Telco Cloud Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 7.0 sans le correctif de s\u00e9curit\u00e9 ESXi70U3s-24585291",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Cloud Foundation versions 5.x sans le correctif de s\u00e9curit\u00e9 ESXi80U3d-24585383",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Fusion 13.x versions ant\u00e9rieures \u00e0 13.6.3",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware ESXi versions 8.0 sans le correctif de s\u00e9curit\u00e9 ESXi80U2d-24585300 ou ESXi80U3d-24585383",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Telco Cloud Infrastructure versions 2.x et 3.x sans le correctif de s\u00e9curit\u00e9 KB389385",
"product": {
"name": "Telco Cloud Infrastructure",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Workstation versions 17.x ant\u00e9rieures \u00e0 17.6.3",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-22224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22224"
},
{
"name": "CVE-2024-38814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38814"
},
{
"name": "CVE-2025-22226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22226"
},
{
"name": "CVE-2025-22225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22225"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0177",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-03-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.\n\nVMware indique que les vuln\u00e9rabilit\u00e9s CVE-2025-222234, CVE-2025-22225 et CVE-2025-22226 sont activement exploit\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25466",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25466"
},
{
"published_at": "2025-03-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
}
]
}
ICSA-25-077-02
Vulnerability from csaf_cisa - Published: 2025-03-18 06:00 - Updated: 2025-03-18 06:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Rockwell Automation Industrial Data Center (IDC) with VMware: >=Generations_1|<=4
Rockwell Automation / Industrial Data Center (IDC) with VMware
|
>=Generations_1|<=4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation VersaVirtual Appliance (VVA) with VMware: Series_A_and_B
Rockwell Automation / VersaVirtual Appliance (VVA) with VMware
|
Series_A_and_B |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Threat Detection Managed Services (TDMS) with VMware: vers:all/*
Rockwell Automation / Threat Detection Managed Services (TDMS) with VMware
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Endpoint Protection Service with RA Proxy & VMware only: vers:all/*
Rockwell Automation / Endpoint Protection Service with RA Proxy & VMware only
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Engineered and Integrated Solutions with VMware: vers:all/*
Rockwell Automation / Engineered and Integrated Solutions with VMware
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Rockwell Automation Industrial Data Center (IDC) with VMware: >=Generations_1|<=4
Rockwell Automation / Industrial Data Center (IDC) with VMware
|
>=Generations_1|<=4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation VersaVirtual Appliance (VVA) with VMware: Series_A_and_B
Rockwell Automation / VersaVirtual Appliance (VVA) with VMware
|
Series_A_and_B |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Threat Detection Managed Services (TDMS) with VMware: vers:all/*
Rockwell Automation / Threat Detection Managed Services (TDMS) with VMware
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Endpoint Protection Service with RA Proxy & VMware only: vers:all/*
Rockwell Automation / Endpoint Protection Service with RA Proxy & VMware only
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Engineered and Integrated Solutions with VMware: vers:all/*
Rockwell Automation / Engineered and Integrated Solutions with VMware
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Rockwell Automation Industrial Data Center (IDC) with VMware: >=Generations_1|<=4
Rockwell Automation / Industrial Data Center (IDC) with VMware
|
>=Generations_1|<=4 |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation VersaVirtual Appliance (VVA) with VMware: Series_A_and_B
Rockwell Automation / VersaVirtual Appliance (VVA) with VMware
|
Series_A_and_B |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Threat Detection Managed Services (TDMS) with VMware: vers:all/*
Rockwell Automation / Threat Detection Managed Services (TDMS) with VMware
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Endpoint Protection Service with RA Proxy & VMware only: vers:all/*
Rockwell Automation / Endpoint Protection Service with RA Proxy & VMware only
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
|
|
Rockwell Automation Engineered and Integrated Solutions with VMware: vers:all/*
Rockwell Automation / Engineered and Integrated Solutions with VMware
|
vers:all/* |
Mitigation
Mitigation
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
fix
Mitigation
Mitigation
fix
|
{
"document": {
"acknowledgments": [
{
"organization": "Rockwell Automation",
"summary": "reporting these vulnerabilities to CISA"
}
],
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Disclosure is not limited",
"tlp": {
"label": "WHITE",
"url": "https://us-cert.cisa.gov/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "legal_disclaimer",
"text": "All information products included in https://us-cert.cisa.gov/ics are provided \"as is\" for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information contained within. DHS does not endorse any commercial product or service, referenced in this product or otherwise. Further dissemination of this product is governed by the Traffic Light Protocol (TLP) marking in the header. For more information about TLP, see https://us-cert.cisa.gov/tlp/.",
"title": "Legal Notice"
},
{
"category": "summary",
"text": "Successful exploitation of these vulnerabilities could allow an attacker with local administrative privileges to execute code.",
"title": "Risk evaluation"
},
{
"category": "other",
"text": "Critical Manufacturing",
"title": "Critical infrastructure sectors"
},
{
"category": "other",
"text": "Worldwide",
"title": "Countries/areas deployed"
},
{
"category": "other",
"text": "United States",
"title": "Company headquarters location"
},
{
"category": "general",
"text": "CISA recommends users take defensive measures to minimize the risk of exploitation of these vulnerabilities, such as:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Minimize network exposure for all control system devices and/or systems, ensuring they are not accessible from the Internet.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Locate control system networks and remote devices behind firewalls and isolating them from business networks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "When remote access is required, use more secure methods, such as Virtual Private Networks (VPNs), recognizing VPNs may have vulnerabilities and should be updated to the most current version available. Also recognize VPN is only as secure as the connected devices.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA reminds organizations to perform proper impact analysis and risk assessment prior to deploying defensive measures.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also provides a section for control systems security recommended practices on the ICS webpage on cisa.gov/ics. Several CISA products detailing cyber defense best practices are available for reading and download, including Improving Industrial Control Systems Cybersecurity with Defense-in-Depth Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA encourages organizations to implement recommended cybersecurity strategies for proactive defense of ICS assets.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Additional mitigation guidance and recommended practices are publicly available on the ICS webpage at cisa.gov/ics in the technical information paper, ICS-TIP-12-146-01B--Targeted Cyber Intrusion Detection and Mitigation Strategies.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Organizations observing suspected malicious activity should follow established internal procedures and report findings to CISA for tracking and correlation against other incidents.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "CISA also recommends users take the following measures to protect themselves from social engineering attacks:",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Do not click web links or open attachments in unsolicited email messages.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Recognizing and Avoiding Email Scams for more information on avoiding email scams.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "Refer to Avoiding Social Engineering and Phishing Attacks for more information on social engineering attacks.",
"title": "Recommended Practices"
},
{
"category": "general",
"text": "These vulnerabilities are not exploitable remotely.",
"title": "Recommended Practices"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "central@cisa.dhs.gov",
"name": "CISA",
"namespace": "https://www.cisa.gov/"
},
"references": [
{
"category": "self",
"summary": "ICS Advisory ICSA-25-077-02 JSON",
"url": "https://raw.githubusercontent.com/cisagov/CSAF/develop/csaf_files/OT/white/2025/icsa-25-077-02.json"
},
{
"category": "self",
"summary": "ICSA Advisory ICSA-25-077-02 - Web Version",
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-077-02"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/alerts/ICS-ALERT-10-301-01"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/sites/default/files/publications/Cybersecurity_Best_Practices_for_Industrial_Control_Systems.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/topics/industrial-control-systems"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/sites/default/files/publications/emailscams0905.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ncas/tips/ST04-014"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://us-cert.cisa.gov/sites/default/files/recommended_practices/NCCIC_ICS-CERT_Defense_in_Depth_2016_S508C.pdf"
},
{
"category": "external",
"summary": "Recommended Practices",
"url": "https://www.cisa.gov/uscert/ics/tips/ICS-TIP-12-146-01B"
}
],
"title": "Rockwell Automation Lifecycle Services with VMware",
"tracking": {
"current_release_date": "2025-03-18T06:00:00.000000Z",
"generator": {
"engine": {
"name": "CISA CSAF Generator",
"version": "1.0.0"
}
},
"id": "ICSA-25-077-02",
"initial_release_date": "2025-03-18T06:00:00.000000Z",
"revision_history": [
{
"date": "2025-03-18T06:00:00.000000Z",
"legacy_version": "Initial",
"number": "1",
"summary": "Initial Publication"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003e=Generations_1|\u003c=4",
"product": {
"name": "Rockwell Automation Industrial Data Center (IDC) with VMware: \u003e=Generations_1|\u003c=4",
"product_id": "CSAFPID-0001"
}
}
],
"category": "product_name",
"name": "Industrial Data Center (IDC) with VMware"
},
{
"branches": [
{
"category": "product_version",
"name": "Series_A_and_B",
"product": {
"name": "Rockwell Automation VersaVirtual Appliance (VVA) with VMware: Series_A_and_B",
"product_id": "CSAFPID-0002"
}
}
],
"category": "product_name",
"name": "VersaVirtual Appliance (VVA) with VMware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Rockwell Automation Threat Detection Managed Services (TDMS) with VMware: vers:all/*",
"product_id": "CSAFPID-0003"
}
}
],
"category": "product_name",
"name": "Threat Detection Managed Services (TDMS) with VMware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Rockwell Automation Endpoint Protection Service with RA Proxy \u0026 VMware only: vers:all/*",
"product_id": "CSAFPID-0004"
}
}
],
"category": "product_name",
"name": "Endpoint Protection Service with RA Proxy \u0026 VMware only"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:all/*",
"product": {
"name": "Rockwell Automation Engineered and Integrated Solutions with VMware: vers:all/*",
"product_id": "CSAFPID-0005"
}
}
],
"category": "product_name",
"name": "Engineered and Integrated Solutions with VMware"
}
],
"category": "vendor",
"name": "Rockwell Automation"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22224",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "summary",
"text": "A time of check time of use (TOCTOU) vulnerability exists in VMware ESXi, which the affected products use. Exploitation of the vulnerability can allow a threat actor with local administrative privileges to execute code as the virtual machine\u0027s VMX process running on the host.",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22224"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation will contact impacted users to discuss actions needed for remediation efforts.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Users without Rockwell Automation managed services contract, refer to Broadcom\u0027s advisories below:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Support Content Notification - Support Portal - Broadcom support portal",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3d-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3d-release-notes.html"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3s-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3s-release-notes.html"
},
{
"category": "mitigation",
"details": "Additionally, users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Security Best Practices",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
},
{
"cve": "CVE-2025-22225",
"cwe": {
"id": "CWE-123",
"name": "Write-what-where Condition"
},
"notes": [
{
"category": "summary",
"text": "A code execution vulnerability exists in VMware ESXi, which the affected products use. Exploitation of the vulnerability can allow a threat actor with privileges within the VMX process trigger an arbitrary kernel write, leading to an escape of the sandbox. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22225"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation will contact impacted users to discuss actions needed for remediation efforts.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Users without Rockwell Automation managed services contract, refer to Broadcom\u0027s advisories below:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Support Content Notification - Support Portal - Broadcom support portal",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3d-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3d-release-notes.html"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3s-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3s-release-notes.html"
},
{
"category": "mitigation",
"details": "Additionally, users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Security Best Practices",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
},
{
"cve": "CVE-2025-22226",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "summary",
"text": "An out-of-bounds vulnerability exists in VMware ESXi, which the affected products use. Exploitation of the vulnerability can allow a threat actor with administrative privileges to leak memory from the vmx process. ",
"title": "Vulnerability Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
"references": [
{
"category": "external",
"summary": "www.cve.org",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22226"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N"
},
{
"category": "external",
"summary": "www.first.org",
"url": "https://www.first.org/cvss/calculator/4.0#CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N"
}
],
"remediations": [
{
"category": "mitigation",
"details": "Rockwell Automation will contact impacted users to discuss actions needed for remediation efforts.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Users without Rockwell Automation managed services contract, refer to Broadcom\u0027s advisories below:",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Support Content Notification - Support Portal - Broadcom support portal",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3d-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u3d-release-notes.html"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-80u2d-release-notes.html"
},
{
"category": "mitigation",
"details": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3s-release-notes.html",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/7-0/release-notes/esxi-update-and-patch-release-notes/vsphere-esxi-70u3s-release-notes.html"
},
{
"category": "mitigation",
"details": "Additionally, users using the affected software, who are not able to upgrade to one of the corrected versions, are encouraged to apply security best practices, where possible.",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
},
{
"category": "mitigation",
"details": "Security Best Practices",
"product_ids": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
],
"url": "https://rockwellautomation.custhelp.com/app/answers/answer_view/a_id/1085012/loc/en_US#__highlight"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-0001",
"CSAFPID-0002",
"CSAFPID-0003",
"CSAFPID-0004",
"CSAFPID-0005"
]
}
]
}
]
}
NCSC-2025-0073
Vulnerability from csaf_ncscnl - Published: 2025-03-04 14:11 - Updated: 2025-03-04 14:11| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:broadcom/17.6.3
VMWare / Workstation
|
vers:broadcom/17.6.3 | ||
|
vers:broadcom/17.x
VMWare / Workstation
|
vers:broadcom/17.x | ||
|
vers:unknown/17.x <17.6.3
VMWare / Workstation
|
vers:unknown/17.x <17.6.3 | ||
|
vers:broadcom/4.5.x
VMware / Cloud Foundation
|
vers:broadcom/4.5.x | ||
|
vers:broadcom/5.x
VMware / Cloud Foundation
|
vers:broadcom/5.x | ||
|
vers:unknown/4.5.x <esxi70u3s-24585291
VMware / Cloud Foundation
|
vers:unknown/4.5.x <esxi70u3s-24585291 | ||
|
vers:unknown/5.x <esxi80u3d-24585383
VMware / Cloud Foundation
|
vers:unknown/5.x <esxi80u3d-24585383 | ||
|
vers:broadcom/7.0
VMware / ESXi
|
vers:broadcom/7.0 | ||
|
vers:broadcom/8.0
VMware / ESXi
|
vers:broadcom/8.0 | ||
|
vers:broadcom/esxi70u3s-24585291
VMware / ESXi
|
vers:broadcom/esxi70u3s-24585291 | ||
|
vers:broadcom/esxi80u2d-24585300
VMware / ESXi
|
vers:broadcom/esxi80u2d-24585300 | ||
|
vers:broadcom/esxi80u3d-24585383
VMware / ESXi
|
vers:broadcom/esxi80u3d-24585383 | ||
|
vers:unknown/7.0 <esxi70u3s-24585291
VMware / ESXi
|
vers:unknown/7.0 <esxi70u3s-24585291 | ||
|
vers:unknown/8.0 <esxi80u2d-24585300
VMware / ESXi
|
vers:unknown/8.0 <esxi80u2d-24585300 | ||
|
vers:unknown/8.0 <esxi80u3d-24585383
VMware / ESXi
|
vers:unknown/8.0 <esxi80u3d-24585383 | ||
|
vers:broadcom/13.6.3
VMware / Fusion
|
vers:broadcom/13.6.3 | ||
|
vers:broadcom/13.x
VMware / Fusion
|
vers:broadcom/13.x | ||
|
vers:unknown/13.x <13.6.3
VMware / Fusion
|
vers:unknown/13.x <13.6.3 | ||
|
vers:broadcom/2.x
VMware / Telco Cloud Infrastructure
|
vers:broadcom/2.x | ||
|
vers:broadcom/3.x
VMware / Telco Cloud Infrastructure
|
vers:broadcom/3.x | ||
|
vers:broadcom/2.x
VMware / Telco Cloud Platform
|
vers:broadcom/2.x | ||
|
vers:broadcom/3.x
VMware / Telco Cloud Platform
|
vers:broadcom/3.x | ||
|
vers:broadcom/4.x
VMware / Telco Cloud Platform
|
vers:broadcom/4.x | ||
|
vers:broadcom/5.x
VMware / Telco Cloud Platform
|
vers:broadcom/5.x |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:broadcom/17.6.3
VMWare / Workstation
|
vers:broadcom/17.6.3 | ||
|
vers:broadcom/17.x
VMWare / Workstation
|
vers:broadcom/17.x | ||
|
vers:unknown/17.x <17.6.3
VMWare / Workstation
|
vers:unknown/17.x <17.6.3 | ||
|
vers:broadcom/4.5.x
VMware / Cloud Foundation
|
vers:broadcom/4.5.x | ||
|
vers:broadcom/5.x
VMware / Cloud Foundation
|
vers:broadcom/5.x | ||
|
vers:unknown/4.5.x <esxi70u3s-24585291
VMware / Cloud Foundation
|
vers:unknown/4.5.x <esxi70u3s-24585291 | ||
|
vers:unknown/5.x <esxi80u3d-24585383
VMware / Cloud Foundation
|
vers:unknown/5.x <esxi80u3d-24585383 | ||
|
vers:broadcom/7.0
VMware / ESXi
|
vers:broadcom/7.0 | ||
|
vers:broadcom/8.0
VMware / ESXi
|
vers:broadcom/8.0 | ||
|
vers:broadcom/esxi70u3s-24585291
VMware / ESXi
|
vers:broadcom/esxi70u3s-24585291 | ||
|
vers:broadcom/esxi80u2d-24585300
VMware / ESXi
|
vers:broadcom/esxi80u2d-24585300 | ||
|
vers:broadcom/esxi80u3d-24585383
VMware / ESXi
|
vers:broadcom/esxi80u3d-24585383 | ||
|
vers:unknown/7.0 <esxi70u3s-24585291
VMware / ESXi
|
vers:unknown/7.0 <esxi70u3s-24585291 | ||
|
vers:unknown/8.0 <esxi80u2d-24585300
VMware / ESXi
|
vers:unknown/8.0 <esxi80u2d-24585300 | ||
|
vers:unknown/8.0 <esxi80u3d-24585383
VMware / ESXi
|
vers:unknown/8.0 <esxi80u3d-24585383 | ||
|
vers:broadcom/13.6.3
VMware / Fusion
|
vers:broadcom/13.6.3 | ||
|
vers:broadcom/13.x
VMware / Fusion
|
vers:broadcom/13.x | ||
|
vers:unknown/13.x <13.6.3
VMware / Fusion
|
vers:unknown/13.x <13.6.3 | ||
|
vers:broadcom/2.x
VMware / Telco Cloud Infrastructure
|
vers:broadcom/2.x | ||
|
vers:broadcom/3.x
VMware / Telco Cloud Infrastructure
|
vers:broadcom/3.x | ||
|
vers:broadcom/2.x
VMware / Telco Cloud Platform
|
vers:broadcom/2.x | ||
|
vers:broadcom/3.x
VMware / Telco Cloud Platform
|
vers:broadcom/3.x | ||
|
vers:broadcom/4.x
VMware / Telco Cloud Platform
|
vers:broadcom/4.x | ||
|
vers:broadcom/5.x
VMware / Telco Cloud Platform
|
vers:broadcom/5.x |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
vers:broadcom/17.6.3
VMWare / Workstation
|
vers:broadcom/17.6.3 | ||
|
vers:broadcom/17.x
VMWare / Workstation
|
vers:broadcom/17.x | ||
|
vers:unknown/17.x <17.6.3
VMWare / Workstation
|
vers:unknown/17.x <17.6.3 | ||
|
vers:broadcom/4.5.x
VMware / Cloud Foundation
|
vers:broadcom/4.5.x | ||
|
vers:broadcom/5.x
VMware / Cloud Foundation
|
vers:broadcom/5.x | ||
|
vers:unknown/4.5.x <esxi70u3s-24585291
VMware / Cloud Foundation
|
vers:unknown/4.5.x <esxi70u3s-24585291 | ||
|
vers:unknown/5.x <esxi80u3d-24585383
VMware / Cloud Foundation
|
vers:unknown/5.x <esxi80u3d-24585383 | ||
|
vers:broadcom/7.0
VMware / ESXi
|
vers:broadcom/7.0 | ||
|
vers:broadcom/8.0
VMware / ESXi
|
vers:broadcom/8.0 | ||
|
vers:broadcom/esxi70u3s-24585291
VMware / ESXi
|
vers:broadcom/esxi70u3s-24585291 | ||
|
vers:broadcom/esxi80u2d-24585300
VMware / ESXi
|
vers:broadcom/esxi80u2d-24585300 | ||
|
vers:broadcom/esxi80u3d-24585383
VMware / ESXi
|
vers:broadcom/esxi80u3d-24585383 | ||
|
vers:unknown/7.0 <esxi70u3s-24585291
VMware / ESXi
|
vers:unknown/7.0 <esxi70u3s-24585291 | ||
|
vers:unknown/8.0 <esxi80u2d-24585300
VMware / ESXi
|
vers:unknown/8.0 <esxi80u2d-24585300 | ||
|
vers:unknown/8.0 <esxi80u3d-24585383
VMware / ESXi
|
vers:unknown/8.0 <esxi80u3d-24585383 | ||
|
vers:broadcom/13.6.3
VMware / Fusion
|
vers:broadcom/13.6.3 | ||
|
vers:broadcom/13.x
VMware / Fusion
|
vers:broadcom/13.x | ||
|
vers:unknown/13.x <13.6.3
VMware / Fusion
|
vers:unknown/13.x <13.6.3 | ||
|
vers:broadcom/2.x
VMware / Telco Cloud Infrastructure
|
vers:broadcom/2.x | ||
|
vers:broadcom/3.x
VMware / Telco Cloud Infrastructure
|
vers:broadcom/3.x | ||
|
vers:broadcom/2.x
VMware / Telco Cloud Platform
|
vers:broadcom/2.x | ||
|
vers:broadcom/3.x
VMware / Telco Cloud Platform
|
vers:broadcom/3.x | ||
|
vers:broadcom/4.x
VMware / Telco Cloud Platform
|
vers:broadcom/4.x | ||
|
vers:broadcom/5.x
VMware / Telco Cloud Platform
|
vers:broadcom/5.x |
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Broadcom heeft kwetsbaarheden verholpen in VMware ESXi (inclusief Workstation en Fusion).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten een TOCTOU-kwetsbaarheid die een kwaadwillende met lokale administratieve rechten in staat stelt om code uit te voeren als het VMX-proces op de host via een out-of-bounds write. Daarnaast is er een arbitrarily write-kwetsbaarheid die het mogelijk maakt voor een kwaadwillende met privileges in het VMX-proces om kernel writes uit te voeren, wat kan leiden tot ontsnapping uit de sandbox-omgeving. Ook is er een informatielek-kwetsbaarheid door een out-of-bounds read in HGFS, wat kan leiden tot geheugenlekken vanuit het VMX-proces.\n\nVan de kwetsbaarheid met kenmerk CVE-2025-22226 meldt Broadcom informatie te hebben dat deze actief is misbruikt.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Broadcom heeft patches uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - broadcom",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
}
],
"title": "Kwetsbaarheden verholpen in VMware producten",
"tracking": {
"current_release_date": "2025-03-04T14:11:56.959153Z",
"generator": {
"date": "2025-02-25T15:15:00Z",
"engine": {
"name": "V.A.",
"version": "1.0"
}
},
"id": "NCSC-2025-0073",
"initial_release_date": "2025-03-04T14:11:56.959153Z",
"revision_history": [
{
"date": "2025-03-04T14:11:56.959153Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:broadcom/17.6.3",
"product": {
"name": "vers:broadcom/17.6.3",
"product_id": "CSAFPID-2407505"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/17.x",
"product": {
"name": "vers:broadcom/17.x",
"product_id": "CSAFPID-2407494"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/17.x \u003c17.6.3",
"product": {
"name": "vers:unknown/17.x \u003c17.6.3",
"product_id": "CSAFPID-2407275"
}
}
],
"category": "product_name",
"name": "Workstation"
}
],
"category": "vendor",
"name": "VMWare"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:broadcom/4.5.x",
"product": {
"name": "vers:broadcom/4.5.x",
"product_id": "CSAFPID-2407495"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/5.x",
"product": {
"name": "vers:broadcom/5.x",
"product_id": "CSAFPID-1668711"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4.5.x \u003cesxi70u3s-24585291",
"product": {
"name": "vers:unknown/4.5.x \u003cesxi70u3s-24585291",
"product_id": "CSAFPID-2407279"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/5.x \u003cesxi80u3d-24585383",
"product": {
"name": "vers:unknown/5.x \u003cesxi80u3d-24585383",
"product_id": "CSAFPID-2407274"
}
}
],
"category": "product_name",
"name": "Cloud Foundation"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:broadcom/7.0",
"product": {
"name": "vers:broadcom/7.0",
"product_id": "CSAFPID-2407493"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/8.0",
"product": {
"name": "vers:broadcom/8.0",
"product_id": "CSAFPID-2407492"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/esxi70u3s-24585291",
"product": {
"name": "vers:broadcom/esxi70u3s-24585291",
"product_id": "CSAFPID-2407504"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/esxi80u2d-24585300",
"product": {
"name": "vers:broadcom/esxi80u2d-24585300",
"product_id": "CSAFPID-2407503"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/esxi80u3d-24585383",
"product": {
"name": "vers:broadcom/esxi80u3d-24585383",
"product_id": "CSAFPID-2407502"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/7.0 \u003cesxi70u3s-24585291",
"product": {
"name": "vers:unknown/7.0 \u003cesxi70u3s-24585291",
"product_id": "CSAFPID-2407276"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/8.0 \u003cesxi80u2d-24585300",
"product": {
"name": "vers:unknown/8.0 \u003cesxi80u2d-24585300",
"product_id": "CSAFPID-2407277"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/8.0 \u003cesxi80u3d-24585383",
"product": {
"name": "vers:unknown/8.0 \u003cesxi80u3d-24585383",
"product_id": "CSAFPID-2407278"
}
}
],
"category": "product_name",
"name": "ESXi"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:broadcom/13.6.3",
"product": {
"name": "vers:broadcom/13.6.3",
"product_id": "CSAFPID-2407507"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/13.x",
"product": {
"name": "vers:broadcom/13.x",
"product_id": "CSAFPID-2407506"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/13.x \u003c13.6.3",
"product": {
"name": "vers:unknown/13.x \u003c13.6.3",
"product_id": "CSAFPID-2407280"
}
}
],
"category": "product_name",
"name": "Fusion"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:broadcom/2.x",
"product": {
"name": "vers:broadcom/2.x",
"product_id": "CSAFPID-2407501"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/3.x",
"product": {
"name": "vers:broadcom/3.x",
"product_id": "CSAFPID-2407500"
}
}
],
"category": "product_name",
"name": "Telco Cloud Infrastructure"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:broadcom/2.x",
"product": {
"name": "vers:broadcom/2.x",
"product_id": "CSAFPID-2407499"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/3.x",
"product": {
"name": "vers:broadcom/3.x",
"product_id": "CSAFPID-2407498"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/4.x",
"product": {
"name": "vers:broadcom/4.x",
"product_id": "CSAFPID-2407497"
}
},
{
"category": "product_version_range",
"name": "vers:broadcom/5.x",
"product": {
"name": "vers:broadcom/5.x",
"product_id": "CSAFPID-2407496"
}
}
],
"category": "product_name",
"name": "Telco Cloud Platform"
}
],
"category": "vendor",
"name": "VMware"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22224",
"product_status": {
"known_affected": [
"CSAFPID-2407505",
"CSAFPID-2407494",
"CSAFPID-2407275",
"CSAFPID-2407495",
"CSAFPID-1668711",
"CSAFPID-2407279",
"CSAFPID-2407274",
"CSAFPID-2407493",
"CSAFPID-2407492",
"CSAFPID-2407504",
"CSAFPID-2407503",
"CSAFPID-2407502",
"CSAFPID-2407276",
"CSAFPID-2407277",
"CSAFPID-2407278",
"CSAFPID-2407507",
"CSAFPID-2407506",
"CSAFPID-2407280",
"CSAFPID-2407501",
"CSAFPID-2407500",
"CSAFPID-2407499",
"CSAFPID-2407498",
"CSAFPID-2407497",
"CSAFPID-2407496"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22224",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22224.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2407505",
"CSAFPID-2407494",
"CSAFPID-2407275",
"CSAFPID-2407495",
"CSAFPID-1668711",
"CSAFPID-2407279",
"CSAFPID-2407274",
"CSAFPID-2407493",
"CSAFPID-2407492",
"CSAFPID-2407504",
"CSAFPID-2407503",
"CSAFPID-2407502",
"CSAFPID-2407276",
"CSAFPID-2407277",
"CSAFPID-2407278",
"CSAFPID-2407507",
"CSAFPID-2407506",
"CSAFPID-2407280",
"CSAFPID-2407501",
"CSAFPID-2407500",
"CSAFPID-2407499",
"CSAFPID-2407498",
"CSAFPID-2407497",
"CSAFPID-2407496"
]
}
],
"title": "CVE-2025-22224"
},
{
"cve": "CVE-2025-22225",
"product_status": {
"known_affected": [
"CSAFPID-2407505",
"CSAFPID-2407494",
"CSAFPID-2407275",
"CSAFPID-2407495",
"CSAFPID-1668711",
"CSAFPID-2407279",
"CSAFPID-2407274",
"CSAFPID-2407493",
"CSAFPID-2407492",
"CSAFPID-2407504",
"CSAFPID-2407503",
"CSAFPID-2407502",
"CSAFPID-2407276",
"CSAFPID-2407277",
"CSAFPID-2407278",
"CSAFPID-2407507",
"CSAFPID-2407506",
"CSAFPID-2407280",
"CSAFPID-2407501",
"CSAFPID-2407500",
"CSAFPID-2407499",
"CSAFPID-2407498",
"CSAFPID-2407497",
"CSAFPID-2407496"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22225",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22225.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2407505",
"CSAFPID-2407494",
"CSAFPID-2407275",
"CSAFPID-2407495",
"CSAFPID-1668711",
"CSAFPID-2407279",
"CSAFPID-2407274",
"CSAFPID-2407493",
"CSAFPID-2407492",
"CSAFPID-2407504",
"CSAFPID-2407503",
"CSAFPID-2407502",
"CSAFPID-2407276",
"CSAFPID-2407277",
"CSAFPID-2407278",
"CSAFPID-2407507",
"CSAFPID-2407506",
"CSAFPID-2407280",
"CSAFPID-2407501",
"CSAFPID-2407500",
"CSAFPID-2407499",
"CSAFPID-2407498",
"CSAFPID-2407497",
"CSAFPID-2407496"
]
}
],
"title": "CVE-2025-22225"
},
{
"cve": "CVE-2025-22226",
"product_status": {
"known_affected": [
"CSAFPID-2407505",
"CSAFPID-2407494",
"CSAFPID-2407275",
"CSAFPID-2407495",
"CSAFPID-1668711",
"CSAFPID-2407279",
"CSAFPID-2407274",
"CSAFPID-2407493",
"CSAFPID-2407492",
"CSAFPID-2407504",
"CSAFPID-2407503",
"CSAFPID-2407502",
"CSAFPID-2407276",
"CSAFPID-2407277",
"CSAFPID-2407278",
"CSAFPID-2407507",
"CSAFPID-2407506",
"CSAFPID-2407280",
"CSAFPID-2407501",
"CSAFPID-2407500",
"CSAFPID-2407499",
"CSAFPID-2407498",
"CSAFPID-2407497",
"CSAFPID-2407496"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22226",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22226.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2407505",
"CSAFPID-2407494",
"CSAFPID-2407275",
"CSAFPID-2407495",
"CSAFPID-1668711",
"CSAFPID-2407279",
"CSAFPID-2407274",
"CSAFPID-2407493",
"CSAFPID-2407492",
"CSAFPID-2407504",
"CSAFPID-2407503",
"CSAFPID-2407502",
"CSAFPID-2407276",
"CSAFPID-2407277",
"CSAFPID-2407278",
"CSAFPID-2407507",
"CSAFPID-2407506",
"CSAFPID-2407280",
"CSAFPID-2407501",
"CSAFPID-2407500",
"CSAFPID-2407499",
"CSAFPID-2407498",
"CSAFPID-2407497",
"CSAFPID-2407496"
]
}
],
"title": "CVE-2025-22226"
}
]
}
BDU:2025-02354
Vulnerability from fstec - Published: 04.03.2025{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "VMware Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u043e\u0442 8.0 \u0434\u043e ESXi80U3d-24585383 (VMware ESXi), \u043e\u0442 8.0 \u0434\u043e ESXi80U2d-24585300 (VMware ESXi), \u043e\u0442 7.0 \u0434\u043e ESXi70U3s-24585291 (VMware ESXi), \u043e\u0442 17.0.0 \u0434\u043e 17.6.3 (VMWare Workstation), \u043e\u0442 5.0 \u0434\u043e ESXi80U3d-24585383 (VMware Cloud Foundation), \u043e\u0442 4.5.0 \u0434\u043e ESXi70U3s-24585291 (VMware Cloud Foundation), \u043e\u0442 5.0 \u0434\u043e KB389385 (VMware Telco Cloud Platform), \u043e\u0442 4.0 \u0434\u043e KB389385 (VMware Telco Cloud Platform), \u043e\u0442 3.0 \u0434\u043e KB389385 (VMware Telco Cloud Platform), \u043e\u0442 2.0 \u0434\u043e KB389385 (VMware Telco Cloud Platform), \u043e\u0442 13.0.0 \u0434\u043e 13.6.3 (VMWare Workstation)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432. \u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439 (IDS/IPS) \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u0438 \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u0438\u0437\u043c\u0435\u043d\u0435\u043d\u0438\u0439 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0441\u0438\u0441\u0442\u0435\u043c\u044b;\n- \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0441 \u0446\u0435\u043b\u044c\u044e \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f \u043d\u0435\u0448\u0442\u0430\u0442\u043d\u043e\u0433\u043e \u043f\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0445 \u043c\u0430\u0448\u0438\u043d;\n- \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439;\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435/\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043d\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439. \n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "04.03.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.03.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "05.03.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-02354",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-22224",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "VMware ESXi, VMWare Workstation, VMware Cloud Foundation, VMware Telco Cloud Platform",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u043e\u0432 VMware ESXi, \u0438 Vmware Workstation, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb), \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041e\u0434\u043d\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0435 \u0432\u044b\u043f\u043e\u043b\u043d\u0435\u043d\u0438\u0435 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u0441 \u043d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0439 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0435\u0439 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb) (CWE-362)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u043e\u0432 VMware ESXi, \u0438 Vmware Workstation \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0448\u0438\u0431\u043a\u0430\u043c\u0438 \u0441\u0438\u043d\u0445\u0440\u043e\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0438 \u043e\u0431\u0449\u0435\u0433\u043e \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0421\u0438\u0442\u0443\u0430\u0446\u0438\u044f \u0433\u043e\u043d\u043a\u0438\u00bb). \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u043e\u043a\u0430\u043c\u0438 \u0438 \u0441\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435\u043c",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-362",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,2)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,3)"
}
FKIE_CVE-2025-22224
Vulnerability from fkie_nvd - Published: 2025-03-04 12:15 - Updated: 2025-10-30 19:528.2 (High) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
{
"cisaActionDue": "2025-03-25",
"cisaExploitAdd": "2025-03-04",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "VMware ESXi and Workstation TOCTOU Race Condition Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*",
"matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*",
"matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*",
"matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*",
"matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*",
"matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*",
"matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*",
"matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*",
"matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*",
"matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*",
"matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*",
"matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*",
"matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*",
"matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*",
"matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*",
"matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*",
"matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*",
"matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*",
"matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*",
"matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*",
"matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*",
"matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*",
"matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*",
"matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*",
"matchCriteriaId": "F50302BB-B950-4178-A109-358393E0A50A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*",
"matchCriteriaId": "BCCA4A31-1291-4FB4-9FA5-D2CCD086D660",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*",
"matchCriteriaId": "78604FE5-510F-4979-B2E3-D36B3083224A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*",
"matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*",
"matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*",
"matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*",
"matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*",
"matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*",
"matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*",
"matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*",
"matchCriteriaId": "18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*",
"matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*",
"matchCriteriaId": "B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*",
"matchCriteriaId": "ED92209F-FBD6-43F9-9A15-3842B139FCC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*",
"matchCriteriaId": "6B701151-1B57-4E2D-A9AB-586FACEA2385",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*",
"matchCriteriaId": "4230B9AA-9E0C-4AE2-814D-8DD641394879",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*",
"matchCriteriaId": "F2FA150B-93E4-44D2-BF6D-347085A95776",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*",
"matchCriteriaId": "31A7BB38-3238-413E-9736-F1A165D40867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E46A694-8698-4283-9E25-01F222B63E9A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "59B9476F-E5E7-46B6-AC38-4630D0933462",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9A045567-2563-4539-8E95-361087CB7762",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D11103A7-6AB5-4E78-BE11-BC2A04A09F19",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6C5F01D7-2675-4D09-B52B-B02D0EF52AEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B5F8D61F-6E8B-4EE3-91DE-EBA6FF7D289E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B1E94D58-26A0-4E84-8CAD-F8CDB6707642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "FC33D39A-5760-467E-8284-F4E5D8082BBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "448206AA-A023-4AA1-98FD-35BC2A2AB2B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0F6E30F8-B977-40A5-9E45-89B5C5E59170",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D6B84F65-2E52-4445-8F97-2729B84B18E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3124246D-3287-4657-B40D-E7B80A44E7D7",
"versionEndExcluding": "17.6.3",
"versionStartIncluding": "17.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware ESXi, and Workstation\u00a0contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write.\u00a0A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine\u0027s VMX process running on the host."
},
{
"lang": "es",
"value": "VMware ESXi y Workstation contienen una vulnerabilidad TOCTOU (Time-of-Check Time-of-Use) que provoca una escritura fuera de los l\u00edmites. Un actor malintencionado con privilegios administrativos locales en una m\u00e1quina virtual puede aprovechar este problema para ejecutar c\u00f3digo como el proceso VMX de la m\u00e1quina virtual que se ejecuta en el host."
}
],
"id": "CVE-2025-22224",
"lastModified": "2025-10-30T19:52:49.873",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.5,
"impactScore": 6.0,
"source": "security@vmware.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.5,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-03-04T12:15:33.687",
"references": [
{
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2025-22224"
}
],
"sourceIdentifier": "security@vmware.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-367"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-367"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
WID-SEC-W-2025-0480
Vulnerability from csaf_certbund - Published: 2025-03-03 23:00 - Updated: 2025-03-06 23:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
VMware Cloud Foundation 5.x <ESXi80U3d-24585383
VMware / Cloud Foundation
|
5.x <ESXi80U3d-24585383 | ||
|
Google Cloud Platform
Google
|
cpe:/a:google:cloud_platform:-
|
— | |
|
VMware Workstation 17.x <17.6.3
VMware / Workstation
|
17.x <17.6.3 | ||
|
VMware ESXi 7.0 <ESXi70U3s-24585291
VMware / ESXi
|
7.0 <ESXi70U3s-24585291 | ||
|
VMware ESXi 8.0 <ESXi80U2d-24585300
VMware / ESXi
|
8.0 <ESXi80U2d-24585300 | ||
|
VMware ESXi 8.0 <ESXi80U3d-24585383
VMware / ESXi
|
8.0 <ESXi80U3d-24585383 | ||
|
VMware Cloud Foundation 4.5.x <ESXi70U3s-24585291
VMware / Cloud Foundation
|
4.5.x <ESXi70U3s-24585291 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
VMware Cloud Foundation 5.x <ESXi80U3d-24585383
VMware / Cloud Foundation
|
5.x <ESXi80U3d-24585383 | ||
|
Google Cloud Platform
Google
|
cpe:/a:google:cloud_platform:-
|
— | |
|
VMware Fusion 13.x <13.6.3
VMware / Fusion
|
13.x <13.6.3 | ||
|
VMware ESXi 7.0 <ESXi70U3s-24585291
VMware / ESXi
|
7.0 <ESXi70U3s-24585291 | ||
|
VMware ESXi 8.0 <ESXi80U2d-24585300
VMware / ESXi
|
8.0 <ESXi80U2d-24585300 | ||
|
VMware ESXi 8.0 <ESXi80U3d-24585383
VMware / ESXi
|
8.0 <ESXi80U3d-24585383 | ||
|
VMware Cloud Foundation 4.5.x <ESXi70U3s-24585291
VMware / Cloud Foundation
|
4.5.x <ESXi70U3s-24585291 |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
VMware Cloud Foundation 5.x <ESXi80U3d-24585383
VMware / Cloud Foundation
|
5.x <ESXi80U3d-24585383 | ||
|
Google Cloud Platform
Google
|
cpe:/a:google:cloud_platform:-
|
— | |
|
VMware Fusion 13.x <13.6.3
VMware / Fusion
|
13.x <13.6.3 | ||
|
VMware Workstation 17.x <17.6.3
VMware / Workstation
|
17.x <17.6.3 | ||
|
VMware ESXi 7.0 <ESXi70U3s-24585291
VMware / ESXi
|
7.0 <ESXi70U3s-24585291 | ||
|
VMware ESXi 8.0 <ESXi80U2d-24585300
VMware / ESXi
|
8.0 <ESXi80U2d-24585300 | ||
|
VMware ESXi 8.0 <ESXi80U3d-24585383
VMware / ESXi
|
8.0 <ESXi80U3d-24585383 | ||
|
VMware Cloud Foundation 4.5.x <ESXi70U3s-24585291
VMware / Cloud Foundation
|
4.5.x <ESXi70U3s-24585291 |
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die Virtualisierungssoftware von VMware erm\u00f6glicht die simultane Ausf\u00fchrung von verschiedenen Betriebssystemen auf einem Host-System.\r\nVMware Cloud Foundation ist eine Hybrid Cloud-Plattform f\u00fcr VM-Management und Container-Orchestrierung.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in VMware ESXi, VMware Workstation, VMware Fusion und VMware Cloud Foundation ausnutzen, um beliebigen Code auszuf\u00fchren, erh\u00f6hte Rechte zu erlangen und vertrauliche Informationen preiszugeben.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0480 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0480.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0480 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0480"
},
{
"category": "external",
"summary": "VMware Security Advisory vom 2025-03-03",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-011 vom 2025-03-06",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-011"
}
],
"source_lang": "en-US",
"title": "VMware ESXi: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-03-06T23:00:00.000+00:00",
"generator": {
"date": "2025-03-07T09:05:17.866+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0480",
"initial_release_date": "2025-03-03T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-03-03T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-03-04T23:00:00.000+00:00",
"number": "2",
"summary": "CVE-2025-22224 korrigiert"
},
{
"date": "2025-03-06T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Google aufgenommen"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "5.x \u003cESXi80U3d-24585383",
"product": {
"name": "VMware Cloud Foundation 5.x \u003cESXi80U3d-24585383",
"product_id": "T041561"
}
},
{
"category": "product_version",
"name": "5.x ESXi80U3d-24585383",
"product": {
"name": "VMware Cloud Foundation 5.x ESXi80U3d-24585383",
"product_id": "T041561-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:cloud_foundation:5.x__esxi80u3d-24585383"
}
}
},
{
"category": "product_version_range",
"name": "4.5.x \u003cESXi70U3s-24585291",
"product": {
"name": "VMware Cloud Foundation 4.5.x \u003cESXi70U3s-24585291",
"product_id": "T041562"
}
},
{
"category": "product_version",
"name": "4.5.x ESXi70U3s-24585291",
"product": {
"name": "VMware Cloud Foundation 4.5.x ESXi70U3s-24585291",
"product_id": "T041562-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:cloud_foundation:4.5.x__esxi70u3s-24585291"
}
}
}
],
"category": "product_name",
"name": "Cloud Foundation"
},
{
"branches": [
{
"category": "product_version_range",
"name": "8.0 \u003cESXi80U3d-24585383",
"product": {
"name": "VMware ESXi 8.0 \u003cESXi80U3d-24585383",
"product_id": "T041563"
}
},
{
"category": "product_version",
"name": "8.0 ESXi80U3d-24585383",
"product": {
"name": "VMware ESXi 8.0 ESXi80U3d-24585383",
"product_id": "T041563-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:8.0__esxi80u3d-24585383"
}
}
},
{
"category": "product_version_range",
"name": "8.0 \u003cESXi80U2d-24585300",
"product": {
"name": "VMware ESXi 8.0 \u003cESXi80U2d-24585300",
"product_id": "T041564"
}
},
{
"category": "product_version",
"name": "8.0 ESXi80U2d-24585300",
"product": {
"name": "VMware ESXi 8.0 ESXi80U2d-24585300",
"product_id": "T041564-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:8.0__esxi80u2d-24585300"
}
}
},
{
"category": "product_version_range",
"name": "7.0 \u003cESXi70U3s-24585291",
"product": {
"name": "VMware ESXi 7.0 \u003cESXi70U3s-24585291",
"product_id": "T041565"
}
},
{
"category": "product_version",
"name": "7.0 ESXi70U3s-24585291",
"product": {
"name": "VMware ESXi 7.0 ESXi70U3s-24585291",
"product_id": "T041565-fixed",
"product_identification_helper": {
"cpe": "cpe:/o:vmware:esxi:7.0__esxi70u3s-24585291"
}
}
}
],
"category": "product_name",
"name": "ESXi"
},
{
"branches": [
{
"category": "product_version_range",
"name": "13.x \u003c13.6.3",
"product": {
"name": "VMware Fusion 13.x \u003c13.6.3",
"product_id": "T041567"
}
},
{
"category": "product_version",
"name": "13.x 13.6.3",
"product": {
"name": "VMware Fusion 13.x 13.6.3",
"product_id": "T041567-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:fusion:13.x__13.6.3"
}
}
}
],
"category": "product_name",
"name": "Fusion"
},
{
"branches": [
{
"category": "product_version_range",
"name": "17.x \u003c17.6.3",
"product": {
"name": "VMware Workstation 17.x \u003c17.6.3",
"product_id": "T041566"
}
},
{
"category": "product_version",
"name": "17.x 17.6.3",
"product": {
"name": "VMware Workstation 17.x 17.6.3",
"product_id": "T041566-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:workstation:17.x__17.6.3"
}
}
}
],
"category": "product_name",
"name": "Workstation"
}
],
"category": "vendor",
"name": "VMware"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22224",
"product_status": {
"known_affected": [
"T041561",
"393401",
"T041566",
"T041565",
"T041564",
"T041563",
"T041562"
]
},
"release_date": "2025-03-03T23:00:00.000+00:00",
"title": "CVE-2025-22224"
},
{
"cve": "CVE-2025-22225",
"product_status": {
"known_affected": [
"T041561",
"393401",
"T041567",
"T041565",
"T041564",
"T041563",
"T041562"
]
},
"release_date": "2025-03-03T23:00:00.000+00:00",
"title": "CVE-2025-22225"
},
{
"cve": "CVE-2025-22226",
"product_status": {
"known_affected": [
"T041561",
"393401",
"T041567",
"T041566",
"T041565",
"T041564",
"T041563",
"T041562"
]
},
"release_date": "2025-03-03T23:00:00.000+00:00",
"title": "CVE-2025-22226"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.