Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure

Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure

Posted on January 9, 2026January 9, 2026 By CWS

A Chinese language menace actor constructed an exploit for 3 VMware ESXi vulnerabilities that have been patched in March 2025 over a yr earlier than public disclosure, cybersecurity agency Huntress experiences.

The three bugs, tracked as CVE-2025-22224, CVE-2025-22225 and CVE-2025-22226, and named ESXicape, permit privileged attackers to execute arbitrary code and escape the VM to compromise the hypervisor itself.

VMware proprietor Broadcom warned final yr that the three flaws had been exploited within the wild as zero-days, however didn’t share info on the assaults.

Now, Huntress says a menace actor has tried to use the VMware ESXi vulnerabilities in December 2025, in an assault possible involving ransomware.

Preliminary entry to the focused atmosphere, Huntress says, was obtained by means of a compromised SonicWall VPN occasion.

The hackers then abused a Area Admin (DA) account to entry the first area controller after which deployed the ESXi exploit toolkit.Commercial. Scroll to proceed studying.

As a part of the assault, the hackers modified the Home windows firewall to dam the sufferer’s entry to exterior networks, harvested information for exfiltration, after which executed the exploit, which escapes the VM and deploys a backdoor on the ESXi hypervisor.

Evaluation of the VMware exploit, Huntress says, suggests it was developed by a well-resourced menace actor possible working in a Chinese language-speaking area.

The toolkit “was doubtlessly constructed as a zero-day exploit over a yr earlier than VMware’s public disclosure,” the cybersecurity agency says.

Primarily based on timestamps within the exploit’s binaries, Huntress believes that the exploit is perhaps dated February 2024. A VSOCK communication instrument used within the assault was possible created in November 2023.

“This exploit toolkit helps 155 ESXi builds spanning variations 5.1 by means of 8.0. In case you are operating end-of-life variations, you might be uncovered with no repair accessible,” Huntress notes.

Organizations are suggested to use patches for these VMware ESXi vulnerabilities as quickly as potential.

Information from The Shadowserver Basis reveals that, as of January 8, 2026, over 30,000 internet-exposed ESXi cases might be weak to CVE-2025-22224. These deployments is perhaps affected by different bugs as effectively.

Associated: CISA Provides Exploited XWiki, VMware Flaws to KEV Catalog

Associated: Broadcom Fails to Disclose Zero-Day Exploitation of VMware Vulnerability

Associated: VMware Flaws That Earned Hackers $340,000 at Pwn2Own Patched

Associated: NATO-Flagged Vulnerability Tops Newest VMware Safety Patch Batch

Security Week News Tags:Built, Disclosure, Exploit, Flaws, Public, VMware, Year, ZeroDay

Post navigation

Previous Post: How K-12 Schools Can Solve Their Top 10 Cybersecurity Challenges
Next Post: 377,000 Impacted by Data Breach at Texas Gas Station Firm

Related Posts

Law Firms Warned of Silent Ransom Group Attacks Law Firms Warned of Silent Ransom Group Attacks Security Week News
Douglas Day: From Engineer to Ethical Hacker Douglas Day: From Engineer to Ethical Hacker Security Week News
Google Agrees to .3 Billion Settlement in Texas Privacy Lawsuits Google Agrees to $1.3 Billion Settlement in Texas Privacy Lawsuits Security Week News
Europol Announces More DDoS Service Takedowns, Arrests Europol Announces More DDoS Service Takedowns, Arrests Security Week News
Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Taming the Hacker Storm: Why Millions in Cybersecurity Spending Isn’t Enough Security Week News
PyPI Warns Users of Fresh Phishing Campaign PyPI Warns Users of Fresh Phishing Campaign Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark