VMware

VMSA-2025-0004 Critical VMware ESXi, Workstation, and Fusion Vulnerability Patch Now!

A critical new vulnerability in VMware products noted in VMSA-2025-0004, tracked as CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

In case you haven’t heard as of yet, there is a new critical VMware ESXi, Workstation, and Fusion vulnerability that has been discovered and noted in the VMSA-2025-0004 security bulletin. These are tracked as CVE-2025-22224, CVE-2025-22225, CVE-2025-22226. Let’s look at the new vulnerability, what it entails, and how to remediate.

Details about the new VMSA-2025-0004 security bulletin

The vulnerabilities tracked in this VMSA are the following: CVE-2025-22224, CVE-2025-22225, CVE-2025-22226. So, this includes multiple vulnerabilities affecting multiple products, including VMware ESXi, VMware Workstation, VMware Cloud Foundation, VMware Fusion, and Telco Cloud Platform.

Let’s look at the three primary vulnerabilities as part of this VMSA security bulletin, what they affect and how they are remediated.

1. VMCI heap-overflow vulnerability (CVS-2025-22224)

This is the worst in terms of the CVSSv3 score, rated at a 9.3 critical vulnerability. It is a Time-of-Check Time-of-Use (TOCTOU) vulnerability that is found in VMware ESXi and Workstation that can lead to an out-of-bounds write by an attacker. If an attacker has local administrative privileges on a virtual machine, they can exploit this issue to execute code as the VMX process that is running on the host.

Being the critical nature of the vulnerability, VMware has assigned it a 9.3 critical vulnerability and noted there is also evidence this is being actively exploited in the wild.

2. VMware ESXi arbitrary write vulnerability (CVE-2025-22225)

This vulnerability as part of the VMSA-2025-0004 bulletin is a vulnerability that enables an attacker with privileges within the VMX process to trigger a kernel write. This can lead to a sandbox escape. This part of the vulnerability affects VMware ESXi and has been given a CVSSv3 score of 8.2, which is an important vulnerability range. Again, with this vulnerability there is evidence that there may be active exploitation of this in the wild.

3. HGFS information-disclosure vulnerability (CVE-2025-22226)

This vulnerability is present in VMware ESXi, Workstation, and Fusion, It is an out-of-bounds read vulnerability in HGFS that can potentially be exploited by an attacker with administrative privileges to a virtual machine. If so, they can potentially leak memory contents from the VMX process. The CVSSv3 base score for this one is 7.1 and is also categorized in the important range. There is also evidence with this portion of the vulnerability of active exploitation in the wild.

How do you fix these vulnerabilities?

There is no workaround that is noted in the VMSA for the three vulnerabilities. Only patching can remediate the threat associated with these.

How to patch the new VMSA-2025-0004

Below, we will show how to patch the vulnerabilities found in the VMSA-2025-0004 bulletin using the vSphere Lifecycle Management tool that provides image-based remediation for your cluster. Click the “hamburger” menu on the upper left-hand side of the vSphere Client. Then select Image Depot > Actions > Sync Updates.

Syncing updates in vcenter server
Syncing updates in vcenter server

This will queue the sync updates task in vCenter Server. This step will take a couple of minutes to run.

Vcenter task to sync updates kicks off
Vcenter task to sync updates kicks off

After the task completes, you should see a new version appear that shows the release date of 03/04/2025. The new version is ESXi 8.0 U3d – 24585383.

New esxi 8.0 u3d 24585383 update available
New esxi 8.0 u3d 24585383 update available

Click your cluster in the vSphere Client. Then click the Updates tab. You will see the old version listed for your current image for your cluster. Click the Edit button.

Beginning the process to edit the image for our vsphere cluster
Beginning the process to edit the image for our vsphere cluster
Click the esxi version to configure a new version for the lifecycle image
Click the esxi version to configure a new version for the lifecycle image

This will pop down a drop down menu. Select the new version, 8.0 U3d – 24585383. Then, click Save.

Select the new version for the image and click save
Select the new version for the image and click save

Once you save the image, it will begin checking for HCL compatibility issues.

Compatibility check begins on the cluster
Compatibility check begins on the cluster

This should finish successfully. You will then see that your cluster is out of compliance with the new image which is expected. This means vSphere has correctly detected the change in the image for the cluster and knows your hosts need to be remediated.

Select your actions for remediating your cluster
Select your actions for remediating your cluster

Resources

You can read the official VMSA security bulletin here: Support Content Notification – Support Portal – Broadcom support portal.

If you need a primer on how to remediate your hosts with the vSphere Lifecycle Manager, watch my YouTube video here that shows the process:

Subscribe to VirtualizationHowto via Email ๐Ÿ””

Enter your email address to subscribe to this blog and receive notifications of new posts by email.



Brandon Lee

Brandon Lee is the Senior Writer, Engineer and owner at Virtualizationhowto.com, and a 7-time VMware vExpert, with over two decades of experience in Information Technology. Having worked for numerous Fortune 500 companies as well as in various industries, He has extensive experience in various IT segments and is a strong advocate for open source technologies. Brandon holds many industry certifications, loves the outdoors and spending time with family. Also, he goes through the effort of testing and troubleshooting issues, so you don't have to.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.