Matt Potter
Security Engineer
On March 4, 2025, Broadcom published an advisory (VMSA-2025-0004) detailing three critical zero-day vulnerabilities affecting multiple VMware products. These vulnerabilities were discovered and disclosed by researchers at the Microsoft Threat Intelligence Center (MSTIC) and were observed being actively exploited in the wild.
The three vulnerabilities present significant risks to organizations using VMware products:
This is a TOCTOU (Time-of-Check Time-of-Use) vulnerability in VMware ESXi and Workstation. A local, authenticated attacker with admin privileges could exploit this vulnerability to gain code execution on the virtual-machine executable (VMX) process.
This arbitrary write vulnerability in VMware ESXi allows a local, authenticated attacker with requisite privileges to escape the sandbox through the VMX process.
This information-disclosure vulnerability affects VMware ESXi, Workstation, and Fusion. An authenticated, local attacker with admin privileges could exploit this vulnerability to cause the VMX process to leak contents from memory.
The combination of these vulnerabilities presents a serious threat to organizations using VMware products:
Organizations should take immediate action to protect their VMware environments:
These vulnerabilities highlight several important security considerations:
The discovery of these zero-day vulnerabilities in VMware products underscores the importance of maintaining a robust security posture for virtualization infrastructure. Organizations should treat these vulnerabilities with the highest priority and implement the recommended mitigation strategies immediately.
As these vulnerabilities were actively exploited in the wild before being patched, organizations should also review their systems for any signs of compromise and consider implementing additional monitoring and security controls for their virtualized environments.
Security Engineer
Matt specializes in infrastructure security and advanced defensive techniques with over 15 years of experience in the cybersecurity industry.
Dec 15, 2023