menu
techminis

A naukri.com initiative

google-web-stories
source image

Kaspersky

3w

read

346

img
dot

Image Credit: Kaspersky

Update your VMware ESXi products now | Kaspersky official blog

  • Broadcom released emergency updates addressing vulnerabilities CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226 affecting VMware products.
  • The exploited CVE-2025-22224 enables virtual machine escape and direct code execution on ESX hypervisor.
  • Vulnerabilities affect various VMware products, potentially impacting more than 41,000 ESXi servers globally.
  • The most severe CVE-2025-22224 vulnerability in VMware ESXi allows code execution on the host.
  • CVE-2025-22225 permits arbitrary kernel write while CVE-2025-22226 allows information disclosure.
  • Exploitation requires administrative privileges on compromised virtual machines.
  • Attack scenarios involve compromising a single virtual machine to seize control of the computing cluster.
  • Recommendations include promptly updating VMware products and leveraging tools like vMotion for patch deployment.
  • Organizations should review settings, properly segment VMware infrastructures, and utilize cloud security tools.
  • Having an EDR agent installed on virtual machines is crucial for detection and prevention of initial infections.

Read Full Article

like

20 Likes

For uninterrupted reading, download the app