Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»VMware ESXi flaw now exploited in ransomware attacks
    Cybersecurity

    VMware ESXi flaw now exploited in ransomware attacks

    adminBy adminFebruary 4, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    VMware
    Share
    Facebook Twitter LinkedIn Pinterest Email

    VMware

    CISA confirmed on Wednesday that ransomware gangs have begun exploiting a high-severity VMware ESXi sandbox escape vulnerability that was previously used in zero-day attacks.

    Broadcom patched this ESXi arbitrary-write vulnerability (tracked as CVE-2025-22225) in March 2025 alongside a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224), and tagged them all as actively exploited zero-days.

    “A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox,” Broadcom said about the CVE-2025-22225 flaw.

    Wiz

    At the time, the company said that the three vulnerabilities affect VMware ESX products, including VMware ESXi, Fusion, Cloud Foundation, vSphere, Workstation, and Telco Cloud Platform, and that attackers with privileged administrator or root access can chain them to escape the virtual machine’s sandbox.

    According to a report published last month by cybersecurity company Huntress, Chinese-speaking threat actors have likely been chaining these flaws in sophisticated zero-day attacks since at least February 2024.

    Flagged as exploited in ransomware attacks

    In a Wednesday update to its list of vulnerabilities exploited in the wild, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) said CVE-2025-22225 is now known to be used in ransomware campaigns but didn’t provide more details about these ongoing attacks.

    CISA first added the flaw to its Known Exploited Vulnerabilities (KEV) catalog in March 2025 and ordered federal agencies to secure their systems by March 25, 2025, as mandated by Binding Operational Directive (BOD) 22-01.

    “Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable,” the cybersecurity agency says.

    Ransomware gangs and state-sponsored hacking groups often target VMware vulnerabilities because VMware products are widely deployed on enterprise systems that commonly store sensitive corporate data.

    For instance, in October, CISA ordered government agencies to patch a high-severity vulnerability (CVE-2025-41244) in Broadcom’s VMware Aria Operations and VMware Tools software, which Chinese hackers have exploited in zero-day attacks since October 2024.

    More recently, CISA has also tagged a critical VMware vCenter Server vulnerability (CVE-2024-37079) as actively exploited in January and ordered federal agencies to secure their servers by February 13.

    In related news, this week, cybersecurity company GreyNoise reported that CISA has “silently” tagged 59 security flaws as known to be used in ransomware campaigns last year alone.


    tines

    Modern IT infrastructure moves faster than manual workflows can handle.

    In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

    attacks ESXi Exploited Flaw ransomware VMware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous Article10 Plug & Play Headline Formulas to Get You Unstuck
    Next Article Intel sets sights on data center GPUs amid AI-driven infrastructure shifts
    admin
    • Website

    Related Posts

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026

    Home Assistant’s intimidating reputation is completely undeserved once you survive the first week

    April 19, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,400)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,675)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now

    April 19, 2026

    Apple AirTag tracking can be misled by replayed Bluetooth signals

    April 19, 2026

    NIST to stop rating non-priority flaws due to volume increase

    April 19, 2026
    Most Popular
    • The “most stylish” Galaxy Watch 8 Classic is 31% off at Amazon right now
    • Apple AirTag tracking can be misled by replayed Bluetooth signals
    • NIST to stop rating non-priority flaws due to volume increase
    • Home Assistant’s intimidating reputation is completely undeserved once you survive the first week
    • The Complete Guide To Agentic Commerce
    • I’ve used Samsung Browser for years, but this is why I won’t go back to Chrome
    • This $10 accessory has completely transformed my Pixel 10
    • Week in review: Acrobat Reader flaw exploited, Claude Mythos offensive capabilities and limits
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.