On-Demand Webinar: Deep Session Inspection and rich metadata can change your security game.

CVE-2025-22226

High-Severity Information Disclosure in VMware ESXi, Workstation, and Fusion HGFS via Out-of-Bounds Read: CVE-2025-22226 Explained

Vulnerability Overview 

CVE ID: CVE-2025-22226  

CVE Title: VMware ESXi, Workstation, and Fusion HGFS Out-of-Bounds Read Information Disclosure 

Severity: High 

Exploit Status: Actively exploited in the wild; public proof-of-concept (PoC) available 

Business Risk: Attackers with admin access in guest VMs can leak host memory, exposing sensitive data and causing major business risks. 

Compliance Impact: Potential data protection risks (e.g., GDPR, HIPAA) from leaked sensitive host information affecting confidentiality and integrity.

Summary

CVE-2025-22226 is a high-severity information leak in VMware ESXi, Workstation, and Fusion’s HGFS (Host-Guest File System). Attackers with admin access inside a guest VM can exploit an out-of-bounds read to leak sensitive VMX process memory, exposing data like passwords and keys. This risks operational security and tenant isolation, with major financial and reputational impact. VMware has released patches—immediate updates, limiting HGFS, and restricting admin access are essential to mitigate the risk.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2025-22226?

Technical Overview

How Does the CVE-2025-22226 Exploit Work?

The attack typically follows these steps:

How Does the CVE-2025-22226 Exploit Work

What Causes CVE-2025-22226?

Vulnerability Root Cause:

This vulnerability is caused by a memory bug in VMware’s HGFS part of the VMX process. When an attacker with admin rights inside a guest VM sends special HGFS requests, the VMX process reads memory it shouldn’t. This mistake leaks sensitive information from the host’s memory, exposing confidential data.

How Can You Mitigate CVE-2025-22226?

If immediate patching is delayed or not possible:  

  • Limit administrative access inside guest virtual machines to trusted users only. 
  • Disable or restrict the use of the HGFS component if feasible. 
  • Monitor VMX process behavior and guest-to-host communication for unusual or malformed HGFS requests. 
  • Apply network segmentation and access controls to minimize attack surface between guests and hosts. 

Which Assets and Systems Are at Risk?

Will Patching CVE-2025-22226 Cause Downtime?

Patch application impact: Moderate. Applying VMware patches may need system restarts, causing short downtime. To avoid issues, update during maintenance times and test patches in staging first. 

Mitigation (if immediate patching is not possible): You can reduce some risk by limiting admin access inside guest VMs and disabling or restricting HGFS if possible. However, these steps are not enough—full patching is required to fully fix the issue and stop host memory leaks. 

How Can You Detect CVE-2025-22226 Exploitation?

Remediation & Response

Patch/Upgrade Instructions:

Apply VMware patches for affected products:

For VMware Cloud Foundation and Telco Cloud Platform customers, apply asynchronous or related ESXi patches as advised by VMware. 

Official VMware Advisory: 

Support Content Notification – Support Portal – Broadcom support portal 

Mitigation Steps if No Patch:

Incident Response Considerations:

Compliance & Governance Notes

Standards Impacted:  

  • NIST 800-53: SI-2 – Flaw Remediation 
    Organizations are expected to remediate known software flaws in a timely manner. VMware has provided patches for CVE-2025-22226 to comply with this requirement.

Where Can I Find More Information on CVE-2025-22226?

CVSS Breakdown Table

MetricValue Description
Base Score7.1High
Attack VectorLocalExploitation requires admin access inside the guest VM
Attack ComplexityLowNo special conditions required for exploitation
Privileges RequiredHighAttacker must have administrative/root access inside the VM
User Interaction NoneExploit does not require user interaction once access is obtained
Scope Unchanged Impact is confined to the same security scope (i.e., guest VM → host memory)
Confidentiality Impact HighSensitive host memory (e.g., passwords, keys) may be exposed

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.