CVE-2025-22226

7.1 HIGH CISA KEV

📋 TL;DR

This vulnerability allows attackers with administrative privileges on a virtual machine to read memory from the host's vmx process, potentially exposing sensitive information. It affects VMware ESXi, Workstation, and Fusion users. The risk is highest for organizations using shared virtualization infrastructure.

💻 Affected Systems

Products:
  • VMware ESXi
  • VMware Workstation
  • VMware Fusion
Versions: Specific versions not provided in CVE description; check vendor advisory for exact ranges
Operating Systems: All supported host OS for affected products
Default Config Vulnerable: ⚠️ Yes
Notes: Requires HGFS (Host Guest File System) to be enabled and attacker must have administrative privileges on the guest VM.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Sensitive host memory contents including credentials, encryption keys, or other VM data could be exfiltrated, leading to full host compromise.

🟠

Likely Case

Information disclosure of host memory contents, potentially revealing configuration details or other sensitive data from the vmx process.

🟢

If Mitigated

Limited impact with proper network segmentation and administrative privilege controls in place.

🌐 Internet-Facing: LOW - Requires administrative access to a VM, which typically isn't internet-facing.
🏢 Internal Only: MEDIUM - Internal attackers with VM admin privileges could exploit this to gain host information.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires administrative access to guest VM and knowledge of exploitation techniques for out-of-bounds read vulnerabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific fixed versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390

Restart Required: Yes

Instructions:

1. Review vendor advisory for affected versions. 2. Download and apply the appropriate patch from VMware. 3. Restart affected systems as required.

🔧 Temporary Workarounds

Disable HGFS

all

Disable the Host Guest File System feature to prevent exploitation

For ESXi: Check documentation for disabling HGFS per VM
For Workstation/Fusion: Disable shared folders in VM settings

🧯 If You Can't Patch

  • Restrict administrative access to VMs to only trusted personnel
  • Implement network segmentation to isolate virtualization infrastructure

🔍 How to Verify

Check if Vulnerable:

Check VMware product version against vendor advisory for affected versions

Check Version:

For ESXi: esxcli system version get; For Workstation/Fusion: Check Help > About

Verify Fix Applied:

Verify installed version matches or exceeds patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Unusual HGFS-related activity
  • Multiple failed HGFS operations
  • Memory access patterns from guest VMs

Network Indicators:

  • Unusual traffic between guest VMs and host services

SIEM Query:

Search for HGFS-related errors or unusual file system access patterns from guest VMs

🔗 References

📤 Share & Export