Broadcom released emergency updates addressing vulnerabilities CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226 affecting VMware products.The exploited CVE-2025-22224 enables virtual machine escape and direct code execution on ESX hypervisor.Vulnerabilities affect various VMware products, potentially impacting more than 41,000 ESXi servers globally.The most severe CVE-2025-22224 vulnerability in VMware ESXi allows code execution on the host.CVE-2025-22225 permits arbitrary kernel write while CVE-2025-22226 allows information disclosure.Exploitation requires administrative privileges on compromised virtual machines.Attack scenarios involve compromising a single virtual machine to seize control of the computing cluster.Recommendations include promptly updating VMware products and leveraging tools like vMotion for patch deployment.Organizations should review settings, properly segment VMware infrastructures, and utilize cloud security tools.Having an EDR agent installed on virtual machines is crucial for detection and prevention of initial infections.