CISA Warns of VMware ESXi Flaw Exploited in Ransomware Attacks: A Critical Vulnerability in Modern IT Infrastructure
The Cybersecurity and Infrastructure Security Agency (CISA) has issued a critical alert regarding a high-severity vulnerability in VMware ESXi, a widely used virtualization platform. This flaw, known as CVE-2025-22225, has been exploited by ransomware gangs, posing a significant threat to enterprise systems.
The vulnerability allows malicious actors with elevated privileges to trigger arbitrary kernel writes, potentially escaping the sandbox and gaining control of the virtual machine. This is a serious concern, as it can lead to unauthorized access and data breaches. CISA's Known Exploited Vulnerabilities (KEV) catalog confirms that this flaw has been actively targeted in ransomware campaigns.
Broadcom, the company responsible for the affected VMware products, patched the vulnerability in March 2025, along with two other critical issues: a memory leak (CVE-2025-22226) and a TOCTOU flaw (CVE-2025-22224). These vulnerabilities were initially reported as zero-days, indicating that they were being actively exploited before the patch was released.
According to a report by Huntress, a cybersecurity firm, Chinese-speaking threat actors have been exploiting these flaws in sophisticated zero-day attacks since at least February 2024. This highlights the urgency of the situation, as attackers have had a significant head start in targeting vulnerable systems.
CISA's alert emphasizes the need for immediate action. Federal agencies were ordered to secure their systems by March 25, 2025, following the Binding Operational Directive (BOD) 22-01. The agency recommends applying vendor-provided mitigations, adhering to cloud service guidance, or discontinuing the use of affected products if mitigations are unavailable.
Ransomware gangs and state-sponsored hacking groups often target VMware vulnerabilities due to the widespread deployment of VMware products in enterprise environments. Sensitive corporate data is commonly stored on these systems, making them attractive targets. For instance, CISA recently ordered government agencies to patch a high-severity vulnerability in VMware Aria Operations and VMware Tools, which had been exploited by Chinese hackers since October 2024.
The recent focus on VMware vulnerabilities is not isolated. CISA has also tagged a critical vCenter Server vulnerability (CVE-2024-37079) as actively exploited and ordered federal agencies to secure their servers by February 13. Moreover, cybersecurity company GreyNoise revealed that CISA silently tagged 59 security flaws as known ransomware campaign targets last year alone.
The rapid evolution of IT infrastructure presents challenges for manual workflows. As systems become more complex, the risk of vulnerabilities increases. CISA's alerts and directives underscore the importance of proactive security measures to protect against sophisticated cyber threats.