Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

CISA Warns of Exploited VMware ESXi Vulnerability Used in Ransomware Attacks


The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a high-severity vulnerability in VMware ESXi that is being exploited by ransomware gangs. CISA warns that federal agencies and organizations that use VMware ESXi should apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a high-severity vulnerability in VMware ESXi being exploited by ransomware gangs.
  • The arbitrary-write vulnerability, CVE-2025-22225, allows attackers to trigger an arbitrary kernel write and escape the sandbox, gaining unauthorized access to sensitive data.
  • Organizations that use VMware ESXi should apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
  • The exploitation of this vulnerability highlights the importance of keeping up-to-date with security patches and applying them promptly.
  • CISA's warnings emphasize the need for incident response planning and business continuity preparedness in organizations.



  • The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning about a high-severity vulnerability in VMware ESXi that is being exploited by ransomware gangs. The vulnerability, CVE-2025-22225, was previously identified as a zero-day threat by Broadcom and patched in March 2025 alongside two other vulnerabilities.

    According to CISA, the arbitrary-write vulnerability allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write, leading to an escape of the sandbox. This means that attackers can chain this flaw with other vulnerabilities to escape the virtual machine's sandbox and gain unauthorized access to sensitive data.

    In a recent update to its list of known exploited vulnerabilities, CISA confirmed that CVE-2025-22225 is now being used in ransomware campaigns. The agency warns that federal agencies and organizations that use VMware ESXi should apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

    Ransomware gangs and state-sponsored hacking groups often target VMware vulnerabilities because they are widely deployed on enterprise systems that commonly store sensitive corporate data. The fact that this vulnerability is being used in ransomware attacks highlights the importance of keeping up-to-date with the latest security patches and applying them promptly.

    In recent months, CISA has flagged several high-severity vulnerabilities in various software products, including VMware vCenter Server, SolarWinds, and Microsoft Office. These vulnerabilities have been exploited by attackers to launch zero-day attacks, compromising sensitive data and disrupting critical infrastructure.

    The exploitation of CVE-2025-22225 is a reminder that cybersecurity threats are constantly evolving, and organizations must remain vigilant in their efforts to protect against them. By staying informed about the latest security patches and vulnerabilities, organizations can take proactive steps to prevent attacks and minimize the impact of successful breaches.

    Furthermore, CISA's warnings about exploited vulnerabilities serve as a reminder of the importance of incident response planning and business continuity preparedness. Organizations must have robust plans in place to respond to cybersecurity incidents, including the ability to quickly detect and contain breaches, restore systems and data, and minimize downtime.

    In conclusion, the exploitation of CVE-2025-22225 highlights the need for organizations to prioritize cybersecurity and stay informed about the latest security patches and vulnerabilities. By taking proactive steps to protect against these threats, organizations can reduce their risk of falling victim to ransomware attacks and minimize the impact of successful breaches.



    Related Information:
  • https://www.ethicalhackingnews.com/articles/CISA-Warns-of-Exploited-VMware-ESXi-Vulnerability-Used-in-Ransomware-Attacks-ehn.shtml

  • https://www.bleepingcomputer.com/news/security/cisa-vmware-esxi-flaw-now-exploited-in-ransomware-attacks/

  • https://www.cisa.gov/news-events/cybersecurity-advisories/aa23-039a

  • https://www.bleepingcomputer.com/news/security/cisa-warns-of-vmware-esxi-bug-exploited-in-ransomware-attacks/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-22225

  • https://www.cvedetails.com/cve/CVE-2025-22225/


  • Published: Wed Feb 4 11:46:38 2026 by llama3.2 3B Q4_K_M













    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us