AI description
CVE-2025-22224 is a critical vulnerability affecting VMware ESXi and Workstation products. It's a time-of-check to time-of-use (TOCTOU) race condition flaw that can lead to an out-of-bounds write within the VMCI (Virtual Machine Communication Interface). An attacker with local administrator privileges on a virtual machine can exploit this vulnerability to execute code as the virtual machine's VMX process running on the host. This vulnerability allows attackers to escalate privileges from a compromised virtual machine to the underlying host system. Successful exploitation could grant the attacker control over the entire ESXi host, potentially impacting other virtual machines running on the same server. This vulnerability is known to be actively exploited in the wild.
- Description
- VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
- Source
- security@vmware.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.2
- Impact score
- 6
- Exploitability score
- 1.5
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
- Severity
- HIGH
Data from CISA
- Vulnerability name
- VMware ESXi and Workstation TOCTOU Race Condition Vulnerability
- Exploit added on
- Mar 4, 2025
- Exploit action due
- Mar 25, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
5
VMware製品の重大な脆弱性(CVE-2025-22224ほか)を悪用したランサムウェア攻撃が世界中で多発している。攻撃者はESXiなどの仮想化基盤に侵入し、権限昇格や認証情報の窃取を行い、VM全体を暗号化する。
@yousukezan
22 Mar 2025
14981 Impressions
114 Retweets
205 Likes
57 Bookmarks
0 Replies
4 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
19 Mar 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Recent #VMware vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) pose a critical threat, allowing attackers to escape compromised VMs and seize control of the hypervisor. The active exploitation of these flaws has made this risk more severe than ever, with… https:/
@sygnia_labs
19 Mar 2025
93 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
18 Mar 2025
26 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
3 ثغرات خطيرة في VMware: مخاطر حقيقية وتحديثات عاجلة أصدرت Broadcom في 4 مارس تحديثات طارئة لمعالجة 3 ثغرات خطيرة (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) تؤثر على ESXi وWorkstation وFusion. إحدى هذه الثغرات (CVE-2025-22224) تم استغلالها فعليًا وتسمح للمهاجمين بالخروج…
@KasperskyKSA
18 Mar 2025
200 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
17 Mar 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Three VMware Vulnerabilities: Key Risks and Urgent Patches On March 4, Broadcom released emergency updates for three critical VMware vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) affecting ESXi, Workstation, and Fusion. At least one (CVE-2025-22224) has been…
@KasperskyKSA
17 Mar 2025
172 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
16 Mar 2025
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
15 Mar 2025
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
VMware three vulnerabilities CVE-2025-22224, CVE-2025-22225, CVE-2025-22226. hackers are back in business.
@XiaoChuStudio
15 Mar 2025
17 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
15 Mar 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/vW1vyg6OAh https://t.co/giNB4ixH3n
@NickBla41002745
14 Mar 2025
29 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Tech alert: Critical VMware vulnerabilities are putting systems at risk! Discover how CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226 could impact ESXi, Workstation, and more. Protect your data now! Read the advisory for more. https://t.co/5cS5XkWqLH #CyberSecurity https://t
@sequretek_sqtk
14 Mar 2025
31 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
VMware Patches 3 Zero-Day Vulnerabilities After Active Exploitation ⚠️ https://t.co/9vjyWHCndI Broadcom has addressed three zero-day vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) in #VMware ESXi, Workstation, and Fusion, following reports of active… https://
@Huntio
13 Mar 2025
84 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
On March 4th, Broadcom released patches for vulnerabilities affecting VMware products: CVE-2025-22224, CVE-2025-22225, CVE-2025-22226. Check out the details here: https://t.co/19v4hvhMGt
@redhataugust
12 Mar 2025
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📣Critical Security Alert: VMware has issued a critical security alert for vulnerabilities in ESXi, Workstation, Fusion, Cloud Foundation, and Telco Cloud Infrastructure. These threats (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) are being exploited. Protect your systems now…
@Helient
11 Mar 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/KuDnAIxELh https://t.co/p0B8PSF0f0
@NickBla41002745
11 Mar 2025
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Over 40,400 VMware ESXi instances are vulnerable to CVE-2025-22224.CVE-2025-22224, is a critical out-of-bounds write flaw that is being actively exploited.#Brazil, #USA, #Europe , #VMware, #ESXi, #Broadcom, #Hypervisor, #Cybersecurity.Learn more here: https://t.co/u32QNALHEC http
@kingops3c
11 Mar 2025
61 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
11 Mar 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
10 Mar 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Over 37,000 VMware ESXi servers vulnerable to ongoing attacks Internet-exposed VMware ESXi instances are vulnerable to CVE-2025-22224, a critical out-of-bounds write flaw that is actively exploited in the wild https://t.co/NLIS2dQ3FT https://t.co/oeGtT23y7e
@actisoft_tech
10 Mar 2025
59 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/4Y9SjCmopV https://t.co/gUIjoFz9hV
@NickBla41002745
10 Mar 2025
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
10 Mar 2025
24 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/7l0O8zkKm0 https://t.co/1oo0hqYi9x
@dansantanna
9 Mar 2025
63 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
9 Mar 2025
22 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
OMG, VMware's got 3 actively exploited zero-days (CVE-2025-22224, etc)! Admin access on a VM could let attackers OWN the hypervisor. Patch NOW or your whole virtual world could crumble! https://t.co/vjJ4Nn5uX8
@fin_tech_news_
8 Mar 2025
25 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Over 37,000 internet-exposed VMware ESXi instances are vulnerable to CVE-2025-22224, a critical out-of-bounds write flaw that is actively exploited in the wild. #VMware #Vulnerability #CyberSecurity https://t.co/fMd47rpvYn
@YourAnonRiots
7 Mar 2025
247 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22224, CVE-2025-22225, CVE-2025-22226: Zero-Day Vulnerabilities in VMware ESXi, Workstation and Fusion Exploited https://t.co/yHNLeIwmrS https://t.co/ZzTq5oioIf
@secured_cyber
7 Mar 2025
30 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
7 Mar 2025
20 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
Over 37,000 internet-exposed VMware ESXi instances are vulnerable to CVE-2025-22224, a critical out-of-bounds write flaw that is actively exploited in the wild. https://t.co/SkHX1G2ckU
@AbubakarMundir
7 Mar 2025
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
🚨CVE-2025-22224 (CVSS 9.3 CRITICAL) Is your organization internet facing servers one of the 37,000 VMware ESXi servers vulnerable to ongoing attacks ? https://t.co/KF4HBSKnyi KQL to check internet facing VMware servers & prioritize your patching today! https://t.co/ukjc2Tz
@0x534c
7 Mar 2025
1477 Impressions
2 Retweets
22 Likes
15 Bookmarks
0 Replies
0 Quotes
Over 37,000 VMware ESXi servers vulnerable to ongoing attacks https://t.co/60tLwPElOc #VMwareEsxi CVE-2025-22224
@PratikSingh_
7 Mar 2025
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
VMware Zero-Day Vulnerabilities Detailed #VMware #CVE-2025-22224 #CVE-2025-22225 #CVE-2025-22226 https://t.co/1pZqaRAqeq
@pravin_karthik
7 Mar 2025
69 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Actively exploited CVE : CVE-2025-22224
@transilienceai
7 Mar 2025
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
インターネット上のVMware ESXiのインスタンス37,000台が、CVE-2025-22224の影響を受けている。この脆弱性は、仮想マシンの管理者権限を持つローカル攻撃者がホスト上でコードを実行することを可能にする。すでにゼロデイ攻撃で利用されていると発表。 https://t.co/jFdfWFcKIg
@yousukezan
6 Mar 2025
2017 Impressions
2 Retweets
17 Likes
5 Bookmarks
0 Replies
0 Quotes
🔴 Más de 37 000 servidores VMware ESXi expuestos a Internet son vulnerables a una falla crítica de escritura fuera de límites (CVE-2025-22224). Esta exposición masiva está siendo reportada por la plataforma de monitoreo de amenazas The Shadowserver Foundation. 🧉 https://t.co/g
@MarquisioX
6 Mar 2025
103 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
インターネットに露出したVMware ESXiインスタンス37,000台以上が重大(Critical)な境界外書き込みCVE-2025-22224に対して脆弱。ShadowServer Foundation報告。同脆弱性は既に悪用されている。 https://t.co/m5M1AvGtD6
@__kokumoto
6 Mar 2025
1807 Impressions
8 Retweets
20 Likes
6 Bookmarks
0 Replies
0 Quotes
41,000+ VMware ESXi Servers at RISK Hackers can exploit three zero-days (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) for VM escapes & hypervisor takeover—potential ransomware attacks incoming! Patch NOW! https://t.co/y9omKLLPv2 #VMware #CyberSecurity #Ransomware #Inf
@dCypherIO
6 Mar 2025
118 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
Broadcom issued a security advisory for 3 zero-day vulnerabilities (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226) in #ESXi, Workstation, and Fusion, already being exploited in the wild. #VirtualPatching is a technique you can leverage to defend against zero-day attacks like…
@vali_cyber
6 Mar 2025
109 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Over 37,000 VMware ESXi servers are vulnerable to attacks due to CVE-2025-22224. While 4,500 have been patched, many remain at risk. CISA sets a deadline of March 25, 2025. 🚨🖥️ #VMware #CISA #USA link: https://t.co/9HM6U3Kf9d https://t.co/uAgk57n2eg
@TweetThreatNews
6 Mar 2025
79 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Over 37,000 VMware ESXi servers are at risk due to a critical vulnerability, CVE-2025-22224, currently being exploited. Protect your systems by understanding the implications and potential mitigation strategies. Read more about this urgent issue at https://t.co/cRoTNJENxi.
@trubetech
6 Mar 2025
47 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-22224 CVSSスコア9.3! 仮想デスクトップにVMware ESXiを使ってる企業は、週末緊急メンテですなぁ。南無阿弥陀仏。 https://t.co/RHDj5kymSj
@umesun
6 Mar 2025
67 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Exploited VMware ESXi Flaws Put Many at Risk of Ransomware, Other Attacks Tens of thousands of VMware ESXi instances are affected by CVE-2025-22224 and other vulnerabilities disclosed recently as zero-days. https://t.co/x0hF098UVM https://t.co/JtN4lEZe5n
@persistsec
6 Mar 2025
127 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 Se han descubierto 3 vulnerabilidades activas en VMware que comprometen la seguridad de entornos de virtualización (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226). Broadcom ha lanzado parches críticos para mitigar explotación previa, incluyendo ejecución remota de código y… h
@pipobarraca
6 Mar 2025
98 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔒 Critical vulnerabilities in VMware ESXi under attack! CVE-2025-22224, CVE-2025-22225, & CVE-2025-22226 expose local admin privileges. Immediate updates needed! #VMware #TechNews #USA link: https://t.co/Et5H8bHvWT https://t.co/cMwPjSE4cS
@TweetThreatNews
6 Mar 2025
139 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
We are scanning & reporting out VMware ESXi CVE-2025-22224 vulnerable instances ("a malicious actor with local admin privileges on a virtual machine may exploit this to execute code as virtual machine's VMX process running on host"). Nearly 41.5K found vulnerable on 2025-03-
@Shadowserver
5 Mar 2025
13442 Impressions
34 Retweets
150 Likes
63 Bookmarks
2 Replies
5 Quotes
۳ آسیب پذیری خطرناک برای محصولات VMware ESX شامل : VMware ESXi, vSphere, Workstation, Fusion, Cloud Foundation با کدهای شناسایی CVE-2025-22224 و CVE-2025-22225 و CVE-2025-22226 منتشر شده است که به هکرها اجازه دسترسی root یا admin به guest OS را می دهد. https://t.co/Poz3aKYxT1 ht
@AmirHossein_sec
5 Mar 2025
79 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Urgent VMware Security Alert! Broadcom warns of active zero-day exploits (CVE-2025-22224, 22225, 22226) in ESXi, Workstation & Fusion. Hackers can escape VMs & breach networks. Patch now to stay secure! https://t.co/Xh9Vw7gAci
@Solvexdigital
5 Mar 2025
72 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔴 VMware ESXi, TOCTOU Vulnerability, #CVE-2025-22224 (Critical) https://t.co/2gRFiA0dgs
@dailycve
5 Mar 2025
27 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Vulnerabilidades críticas en VMware bajo explotación activa 🔍 Ataques en curso explotan fallos en VMware, permitiendo ejecución de código y filtración de datos (CVE-2025-22224, CVE-2025-22225, CVE-2025-22226). https://t.co/Sf1rZNb552
@tpx_Security
5 Mar 2025
188 Impressions
2 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F030A666-1955-438B-8417-5C294905399F"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A790D41E-B398-4233-9EC7-CF5BE2BC3161"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B7619C16-5306-4C4A-88E8-E80876635F66"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "238E7AF4-722B-423D-ABB1-424286B06715"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "1E4DE8C7-72FB-4BEC-AD9E-378786295011"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2E6DE184-35C8-4A13-91D4-4B43E9F0168C"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D3E3A02D-6C1E-4DE8-B845-60F53C056F32"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "12D385F0-DB2B-4802-AD0E-31441DA056B9"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CC6DC107-5142-4155-A33B-D5BE72E9ED38"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "39817170-5C45-4F8A-916D-81B7352055DD"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4ADC3CFF-7415-46A5-817A-2F053B261E8C"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A2F831A7-544E-4B45-BA49-7F7A0234579C"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "80A0DD2E-F1CC-413B-91F9-E3986011A0A0"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C77771B2-BC64-47A5-B6DB-9CBCC4456B67"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E75B2F03-702E-4359-9BB2-E234F1DC38C8"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ACAA9494-5248-4B01-8BC1-C38AB615FFD7"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BF12014B-BF2B-42EF-B70C-59CDA8E2176F"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F965D853-EE4A-41F5-840B-2D009ACC9754"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BA7B7313-FF53-43C9-AF4D-B639053D3FA3"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FC3668A6-262B-42BF-9E90-28BAA9BB3347"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DA4E9185-44BA-41E6-8600-C8616E199334"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F50302BB-B950-4178-A109-358393E0A50A"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3q:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "BCCA4A31-1291-4FB4-9FA5-D2CCD086D660"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0:update_3r:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "78604FE5-510F-4979-B2E3-D36B3083224A"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ED92209F-FBD6-43F9-9A15-3842B139FCC9"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6B701151-1B57-4E2D-A9AB-586FACEA2385"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4230B9AA-9E0C-4AE2-814D-8DD641394879"
},
{
"criteria": "cpe:2.3:o:vmware:esxi:8.0:update_3c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F2FA150B-93E4-44D2-BF6D-347085A95776"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "31A7BB38-3238-413E-9736-F1A165D40867"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7E46A694-8698-4283-9E25-01F222B63E9A"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.5:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "59B9476F-E5E7-46B6-AC38-4630D0933462"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:2.7:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9A045567-2563-4539-8E95-361087CB7762"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_infrastructure:3.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D11103A7-6AB5-4E78-BE11-BC2A04A09F19"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6C5F01D7-2675-4D09-B52B-B02D0EF52AEA"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.5:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B5F8D61F-6E8B-4EE3-91DE-EBA6FF7D289E"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:2.7:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B1E94D58-26A0-4E84-8CAD-F8CDB6707642"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:3.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FC33D39A-5760-467E-8284-F4E5D8082BBD"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "448206AA-A023-4AA1-98FD-35BC2A2AB2B5"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:4.0.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0F6E30F8-B977-40A5-9E45-89B5C5E59170"
},
{
"criteria": "cpe:2.3:a:vmware:telco_cloud_platform:5.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D6B84F65-2E52-4445-8F97-2729B84B18E3"
},
{
"criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3124246D-3287-4657-B40D-E7B80A44E7D7",
"versionEndExcluding": "17.6.3",
"versionStartIncluding": "17.0"
}
],
"operator": "OR"
}
]
}
]