Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure

Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure

Posted on January 9, 2026January 9, 2026 By CWS

A Chinese language menace actor constructed an exploit for 3 VMware ESXi vulnerabilities that have been patched in March 2025 over a yr earlier than public disclosure, cybersecurity agency Huntress experiences.

The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, permit privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself.

VMware proprietor Broadcom warned final yr that the three flaws had been exploited within the wild as zero-days, however didn’t share info on the assaults.

Now, Huntress says a menace actor has tried to use the VMware ESXi vulnerabilities in December 2025, in an assault possible involving ransomware.

Preliminary entry to the focused atmosphere, Huntress says, was obtained by means of a compromised SonicWall VPN occasion.

The hackers then abused a Area Admin (DA) account to entry the first area controller after which deployed the ESXi exploit toolkit.Commercial. Scroll to proceed studying.

As a part of the assault, the hackers modified the Home windows firewall to dam the sufferer’s entry to exterior networks, harvested information for exfiltration, after which executed the exploit, which escapes the VM and deploys a backdoor on the ESXi hypervisor.

Evaluation of the VMware exploit, Huntress says, suggests it was developed by a well-resourced menace actor possible working in a Chinese language-speaking area.

The toolkit “was doubtlessly constructed as a zero-day exploit over a yr earlier than VMware’s public disclosure,” the cybersecurity agency says.

Primarily based on timestamps within the exploit’s binaries, Huntress believes that the exploit is perhaps dated February 2024. A VSOCK communication instrument used within the assault was possible created in November 2023.

“This exploit toolkit helps 155 ESXi builds spanning variations 5.1 by means of 8.0. In case you are operating end-of-life variations, you might be uncovered with no repair accessible,” Huntress notes.

Organizations are suggested to use patches for these VMware ESXi vulnerabilities as quickly as potential.

Information from The Shadowserver Basis reveals that, as of January 8, 2026, over 30,000 internet-exposed ESXi cases might be weak to CVE-2025-22224. These deployments is perhaps affected by different bugs as effectively.

Associated: CISA Provides Exploited XWiki, VMware Flaws to KEV Catalog

Associated: Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability

Associated: VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched

Associated: NATO-Flagged Vulnerability Tops Newest VMware Safety Patch Batch

Security Week News Tags:Built, Disclosure, Exploit, Flaws, Public, VMware, Year, ZeroDay

Post navigation

Previous Post: How K-12 Schools Can Solve Their Top 10 Cybersecurity Challenges
Next Post: 377,000 Impacted by Data Breach at Texas Gas Station Firm

Related Posts

Ransomware Gang Leaks Alleged Kettering Health Data Ransomware Gang Leaks Alleged Kettering Health Data Security Week News
Deutsche Bahn Faces Major DDoS Attack Disruption Deutsche Bahn Faces Major DDoS Attack Disruption Security Week News
WhatsApp View Once Bypass Found, Meta Won’t Fix WhatsApp View Once Bypass Found, Meta Won’t Fix Security Week News
Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Cybersecurity Awareness Month 2025: Prioritizing Identity to Safeguard Critical Infrastructure Security Week News
Citrix Patches Exploited NetScaler Zero-Day Citrix Patches Exploited NetScaler Zero-Day Security Week News
Critical Vulnerability in ScreenConnect Addressed by Update Critical Vulnerability in ScreenConnect Addressed by Update Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark