Close Menu
World Forbes – Business, Tech, AI & Global Insights
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
What's Hot

Tariff threats, wars will slow but not collapse global luxury sales in 2025, new study shows

June 19, 2025

Our song of the summer predictions for 2025

June 19, 2025

Tech tips for tracking pets

June 19, 2025
Facebook X (Twitter) Instagram
Trending
  • Tariff threats, wars will slow but not collapse global luxury sales in 2025, new study shows
  • Our song of the summer predictions for 2025
  • Tech tips for tracking pets
  • South Korea’s last circus, Dongchoon, marks centennial
  • Billionaire Jorge Pérez Plans To Beat Trump’s Immigration Crackdown
  • AP lifestyles reporter discusses chair yoga
  • A Minnesota man cuts short his biking trip in Iran as conflict with Israel breaks out
  • Owners’ anxiety can rub off on pets
World Forbes – Business, Tech, AI & Global InsightsWorld Forbes – Business, Tech, AI & Global Insights
Friday, June 20
  • Home
  • AI
  • Billionaires
  • Business
  • Cybersecurity
  • Education
    • Innovation
  • Money
  • Small Business
  • Sports
  • Trump
World Forbes – Business, Tech, AI & Global Insights
Home » Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks
Cybersecurity

Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks

adminBy adminMarch 6, 2025No Comments3 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr WhatsApp Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email
Post Views: 58


Scans show that tens of thousands of VMware ESXi instances are affected by the vulnerabilities disclosed recently as zero-days.

On March 4, VMware owner Broadcom informed ESXi, Workstation, and Fusion customers about the availability of patches for three zero-days exploited in the wild. Their exploitation can lead to arbitrary code execution, sandbox escapes, and memory leaks. 

The flaws are tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and they can allow attackers with elevated privileges to perform a VM escape.

“This is a situation where an attacker who has already compromised a virtual machine’s guest OS and gained privileged access (administrator or root) could move into the hypervisor itself,” Broadcom explained.

The company has credited Microsoft Threat Intelligence Center for reporting the vulnerabilities — Microsoft likely also saw the attacks exploiting the zero-days — but neither Broadcom nor Microsoft have shared any information on the attacks. 

The cybersecurity agency CISA has added the flaws to its Known Exploited Vulnerabilities (KEV) catalog, which now includes nearly 30 VMware product vulnerabilities. 

Netlas has reported seeing more than 7,000 internet-exposed VMware ESXi instances that appear to be impacted by the vulnerabilities. 

The Shadowserver Foundation has reported seeing more than 41,000 vulnerable ESXi instances, a majority in China, France, the US, Germany, Iran, Brazil and South Korea. 

Advertisement. Scroll to continue reading.

The scans conducted by Shadowserver target CVE-2025-22224, but these instances are likely affected by the other vulnerabilities as well since they all impact the same software versions. 

Technical details and a PoC exploit do not appear to be available for CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226 — this would make it easier for more threat actors to exploit the vulnerabilities — giving organizations more time to install the patches before widespread exploitation commences. 

Security researcher Kevin Beaumont, who has dubbed the vulnerabilities ESXicape, explained, “Once you have ESX access, you can access everything on the ESX server — which includes things such as VM data, and crucially ESX config and mounted storage. Using ESX config and mounted network storage, you can traverse the VMware environment.”

Beaumont added, “For example, orgs use vMotion to allow virtual machines to automatically move across ESX hosts, to balance load and allow for maintenance without downtime (it’s how VMware security patching works). Because of this, a threat actor has direct access to storage of VMs both on and not on that host by design — they’re basically loose on the backend.”

According to the researcher, threat actors could use the vulnerabilities to get past security products and gain access to valuable assets such as Active Directory domain controller databases without triggering alerts. This could be useful in ransomware attacks.

“This is frequently seen in ransomware incidents, where people directly exploit the ESX server or vCenter server over the VMware management network using unpatched vulnerabilities. Once they reach ESX, they reach directly into storage across the whole cluster,” Beaumont said, adding, “However, being able to reach the ESX server hypervisor directly from the Virtual Machine significantly raises the risk. For example, you don’t need to find the ESX server details, or reach a segregated network.”

Beaumont pointed out that a hacker recently offered to sell an ESXi VM escape exploit for $150,000, but it’s unclear if that was a genuine exploit and whether it’s related to the zero-day attacks disclosed this week. 

Related: VMware Patches High-Risk Flaws in Oft-Targeted Aria Operations Products

Related: VMware Struggles to Fix Flaw Exploited at Chinese Hacking Contest

Related: VMware Discloses Exploitation of Hard-to-Fix vCenter Server Flaw



Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
admin
  • Website

Related Posts

O2 Service Vulnerability Exposed User Location

May 20, 2025

Madhu Gottumukkala Officially Announced as CISA Deputy Director

May 20, 2025

BreachRx Lands $15 Million as Investors Bet on Breach-Workflow Software

May 19, 2025

Printer Company Procolored Served Infected Software for Months

May 19, 2025

UK Legal Aid Agency Finds Data Breach Following Cyberattack

May 19, 2025

480,000 Catholic Health Patients Impacted by Serviceaide Data Leak

May 19, 2025
Add A Comment
Leave A Reply Cancel Reply

Don't Miss
Billionaires

Billionaire Jorge Pérez Plans To Beat Trump’s Immigration Crackdown

June 18, 2025

Jorge Pérez made his fortune selling luxury condos in South Florida. Now the wealthy immigrant…

Indian Creek Property Near Jeff Bezos Just Sold For Over $100 Million

June 17, 2025

How Much Is Barron Trump Worth?

June 17, 2025

Trump Just Disclosed Earning $57.4 Million From World Liberty Financial—Here’s What We Know

June 16, 2025
Our Picks

Tariff threats, wars will slow but not collapse global luxury sales in 2025, new study shows

June 19, 2025

Our song of the summer predictions for 2025

June 19, 2025

Tech tips for tracking pets

June 19, 2025

South Korea’s last circus, Dongchoon, marks centennial

June 18, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

About Us
About Us

Welcome to World-Forbes.com
At World-Forbes.com, we bring you the latest insights, trends, and analysis across various industries, empowering our readers with valuable knowledge. Our platform is dedicated to covering a wide range of topics, including sports, small business, business, technology, AI, cybersecurity, and lifestyle.

Our Picks

After Klarna, Zoom’s CEO also uses an AI avatar on quarterly call

May 23, 2025

Anthropic CEO claims AI models hallucinate less than humans

May 22, 2025

Anthropic’s latest flagship AI sure seems to love using the ‘cyclone’ emoji

May 22, 2025

Subscribe to Updates

Subscribe to our newsletter and never miss our latest news

Subscribe my Newsletter for New Posts & tips Let's stay updated!

Facebook X (Twitter) Instagram Pinterest
  • Home
  • About Us
  • Advertise With Us
  • Contact Us
  • DMCA Policy
  • Privacy Policy
  • Terms & Conditions
© 2025 world-forbes. Designed by world-forbes.

Type above and press Enter to search. Press Esc to cancel.