Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 21 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware cloud Foundation
Vmware telco Cloud Infrastructure Vmware telco Cloud Platform |
|
| CPEs | cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:* |
|
| Vendors & Products |
Vmware cloud Foundation
Vmware telco Cloud Infrastructure Vmware telco Cloud Platform |
|
| References |
|
Tue, 04 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Tue, 04 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-367 | |
| Metrics |
ssvc
|
Tue, 04 Mar 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-02-26T19:09:47.563Z
Reserved: 2025-01-02T04:29:30.445Z
Link: CVE-2025-22224
Updated: 2025-03-04T13:47:31.281Z
Status : Analyzed
Published: 2025-03-04T12:15:33.687
Modified: 2025-10-30T19:52:49.873
Link: CVE-2025-22224
No data.
OpenCVE Enrichment
Updated: 2025-06-17T12:08:35Z