On-Demand Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-22224

Critical VM Escape via TOCTOU in VMware ESXi and Workstation: CVE-2025-22224 Explained

Vulnerability Overview 

CVE ID: CVE-2025-22224 

CVE Title: Local VM Escape via TOCTOU in VMware ESXi and Workstation 

Severity: Critical 

Exploit Status: Public PoC (Proof of Concept) 

Business Risk: High — enables full VM escape and host compromise, posing significant financial, operational, and reputational risk.

Summary

CVE-2025-22224 is a critical TOCTOU (Time-of-Check Time-of-Use) vulnerability in VMware ESXi and Workstation. It lets an attacker with admin access inside a virtual machine run code on the host by exploiting a race condition. This allows full VM escape and could lead to control of the host and other VMs. No user interaction is needed once the attacker has admin access to the VM.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-22224?

Technical Overview

How Does the CVE-2025-22224 Exploit Work?

The attack typically follows these steps:

Exploitation Path: How Local VM Admins Trigger CVE-2025-22224 in Vmware

What Causes CVE-2025-22224?

Vulnerability Root Cause:

This vulnerability in VMware ESXi and Workstation is caused by a TOCTOU (Time-of-Check Time-of-Use) race condition. It happens when a resource is checked once but not verified again before use, letting an attacker change it in between. An admin inside a VM can exploit this to write outside allowed memory, escape the VM, run code on the host, and possibly take over other VMs or the entire virtual environment.

How Can You Mitigate CVE-2025-22224?

If immediate patching is delayed or not possible:

Which Assets and Systems Are at Risk?

Will Patching CVE-2025-22224 Cause Downtime?

Patch application impact:

Mitigation (if immediate patching is not possible):

How Can You Detect CVE-2025-22224 Exploitation?

Exploitation Signatures:

Remediation & Response

Patch/Upgrade Instructions:

Mitigation Steps if No Patch:

Incident Response Considerations:

CVSS Breakdown Table

MetricValue Description
Base Score9.3 (Critical)High severity—full VM escape and host compromise possible
Attack VectorLocalExploited from within the guest VM, not remotely
Attack ComplexityLowNo special conditions required; race condition is reliably triggerable
Privileges RequiredNoneNo host privileges needed beyond admin access inside the VM
User Interaction NoneFully automated attack once code runs inside the guest VM
Scope Changed Impacts extend beyond the VM to the host system and other VMs
Confidentiality Impact HighAllows access to host memory and potentially co-located VMs
Integrity Impact HighCan modify host processes or implant persistence
Availability ImpactHighMay cause system crashes or affect other critical VMs on the same host

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.