VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.
Published: 2025-03-04
Broadcom published an advisory for three flaws in several VMware products that were exploited in the wild as zero-days. Organizations are advised to apply the available patches.
https://www.databreachtoday.com/broadcom-patches-actively-exploited-zero-days-in-vmware-esxi-a-27647
https://www.theregister.com/2025/03/04/vmware_plugs_three_hypervisorhijack_holes/
https://www.securityweek.com/broadcom-patches-3-vmware-zero-days-exploited-in-the-wild/
https://www.infosecurity-magazine.com/news/vmware-patch-exploited-zero-day/
https://www.darkreading.com/vulnerabilities-threats/vmware-zero-day-bugs-sandbox-escape
https://therecord.media/vmware-exploited-vulnerabilities-esxi-workstation-fusion
https://thehackernews.com/2025/03/vmware-security-flaws-exploited-in.html
Published: 2025-03-04
Updated: 2025-04-10
Known Exploited Vulnerability (KEV)
Base Score: 6.5
Vector: CVSS2#AV:L/AC:L/Au:M/C:C/I:C/A:C
Severity: Medium
Base Score: 8.2
Vector: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
Severity: High
EPSS: 0.08201
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability of Interest