Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
    Cybersecurity

    CISA confirms exploitation of VMware ESXi flaw by ransomware attackers

    adminBy adminFebruary 5, 2026No Comments3 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    CISA confirms exploitation of VMware ESXi flaw by ransomware attackers
    Share
    Facebook Twitter LinkedIn Pinterest Email

    CVE-2025-22225, a VMware ESXi arbitrary write vulnerability, is being used in ransomware campaigns, CISA confirmed on Wednesday by updating the vulnerability’s entry in its Known Exploited Vulnerabilities (KEV) catalog.

    Researchers linked VMware ESXi zero-day trio to single exploit toolkit

    Broadcom fixed CVE-2025-22225, CVE-2025-22224 (a heap overflow vulnerability) and CVE-2025-22226 (an information disclosure flaw) in VMware ESXi, Workstation, and Fusion in early March 2025.

    At the time of their disclosure, Broadcom said that they have information to suggest that the three vulnerabilities have been exploited in the wild as zero-days, but details about the attacks were not shared. The three flaws were added to CISA’s KEV catalog on the same day.

    In January 2026, Huntress researchers observed attackers using an exploit toolkit they believe takes advantage of all three vulnerabilities.

    “Based on our analysis of the exploit’s behavior, its use of HGFS for information leaking, VMCI for memory corruption, and shellcode that escapes to the kernel, the Huntress Tactical Response team assesses with moderate confidence that this toolkit leverages these three CVEs,” they said at the time.

    They also reported finding evidence suggesting the toolkit may have been developed by Chinese-speaking exploit developers more than a year before VMware’s public disclosure (i.e., in early 2024).

    Delayed KEV ransomware flags complicate patch prioritization

    Despite past public reports that all three vulnerabilities were being leveraged by ransomware actors, the KEV catalog marks only CVE-2025-22225 as “Known To Be Used in Ransomware Campaigns” at present, while the status of CVE-2025-22224 and CVE-2025-22226 remains “Unknown”.

    While the KEV catalog’s primary purpose is to provide US federal civilian agencies with a list of vulnerabilities they are required to remediate by specific deadlines, it is also widely relied upon by private-sector security teams to prioritize patching and mitigation efforts.

    Given that these private-sector consumers are far more likely to face ransomware attacks than nation-state cyber-espionage or sabotage campaigns, it is unfortunate for them that CISA often lags in updating the knownRansomwareCampaignUse field on KEV entries.

    Although GreyNoise’s Glenn Thorpe recently pointed out that “relying on KEV for prioritization is already a trailing indicator, and waiting for the ransomware flag is even slower,” greater visibility into such updates would still be valuable.

    Until CISA decides whether to provide that transparency, Thorpe has offered a practical workaround: an RSS feed that checks the KEV catalog hourly and alerts subscribers whenever CISA flips the knownRansomwareCampaignUse field to “Known”.

    Subscribe to our breaking news e-mail alert to never miss out on the latest breaches, vulnerabilities and cybersecurity threats. Subscribe here!

    attackers CISA confirms ESXi exploitation Flaw ransomware VMware
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleNotta Memo AI voice recorder review
    Next Article Honor quietly had the strongest growth of any major phone brand in 2025
    admin
    • Website

    Related Posts

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    Pro-Russia actors team with Iran-linked hackers in attacks

    March 3, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026

    SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)

    March 3, 2026
    Categories
    • Blogging (32)
    • Cybersecurity (582)
    • Privacy & Online Earning (83)
    • SEO & Digital Marketing (364)
    • Tech Tools & Mobile / Apps (717)
    • WiFi / Internet & Networking (103)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

    March 3, 2026

    Fig Security emerges from stealth with $38 million to resilience-proof enterprise security

    March 3, 2026

    EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches

    March 3, 2026
    Most Popular
    • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
    • Fig Security emerges from stealth with $38 million to resilience-proof enterprise security
    • EFF to Supreme Court: Shut Down Unconstitutional Geofence Searches
    • SEO’s 5 Stages of Grief (And How to Adapt to AI SEO)
    • I finally have full control of my Bambu Lab printer, but it meant ditching Bambu’s cloud
    • Pro-Russia actors team with Iran-linked hackers in attacks
    • 8 Best Student Checking Accounts of March 2026
    • Builderius WordPress Page Builder Integrates Claude AI
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.