Oh No, Not Again! Broadcom Patches Critical VMware Bugs Exploited in the Wild

Broadcom has released patches for three VMware hypervisor vulnerabilities, including the critical CVE-2025-22224. Already exploited by cybercriminals, these bugs allow attackers with admin access to escape a virtual machine and control the host system. If your guests have admin privileges, update promptly before ransomware crews RSVP to the chaos.

Pro Dashboard

Hot Take:

Once again, cyber villains are putting the ‘hyp’ in hypervisor with their Houdini-like escape acts. VMware admins, it’s time to channel your inner bouncer and patch those vulnerabilities before your hypervisors start hosting some unwelcome parties. Remember, just because your virtual machines can’t physically run doesn’t mean they can’t run amok!

Key Points:

  • Broadcom issued patches for three VMware hypervisor vulnerabilities, including one critical flaw.
  • The vulnerabilities can be exploited to gain control of the hypervisor and host systems.
  • An attacker must first have admin-level access to a virtual machine to exploit these bugs.
  • Ransomware gangs are actively exploiting these vulnerabilities in the wild.
  • Admins are urged to update and restart systems promptly to mitigate risks.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?