Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7604 | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. |
Tue, 21 Oct 2025 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 21 Oct 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 10 Apr 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware cloud Foundation Vmware esxi Vmware telco Cloud Infrastructure Vmware telco Cloud Platform |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:* cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:* |
|
| Vendors & Products |
Vmware
Vmware cloud Foundation Vmware esxi Vmware telco Cloud Infrastructure Vmware telco Cloud Platform |
Tue, 04 Mar 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
kev
|
Tue, 04 Mar 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-123 | |
| Metrics |
ssvc
|
Tue, 04 Mar 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox. | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-02-26T19:09:47.409Z
Reserved: 2025-01-02T04:29:59.190Z
Link: CVE-2025-22225
Updated: 2025-03-04T13:48:26.628Z
Status : Analyzed
Published: 2025-03-04T12:15:33.840
Modified: 2025-10-30T19:52:45.300
Link: CVE-2025-22225
No data.
OpenCVE Enrichment
No data.
EUVD