VMware ESXi Zero-Day Flaws Were Likely Exploited in the Wild More Than a Year Before Disclosure

VMware ESXi Zero-Day Flaws Were Likely Exploited in the Wild More Than a Year Before Disclosure

Security researchers have uncovered evidence suggesting that threat actors speaking Chinese may have been exploiting serious vulnerabilities in VMware ESXi long before these flaws were publicly disclosed by the vendor.

According to a new analysis by cybersecurity firm Huntress, a breach observed in December 2025 began with the compromise of a SonicWall VPN appliance. The attackers then deployed a sophisticated toolkit designed to break out of a virtual machine (VM) and compromise the underlying ESXi hypervisor — the core virtualization layer that controls VM execution.

The toolkit appears to chain together three VMware security flaws that were officially disclosed as zero-days in March 2025. While one of the vulnerabilities had a critical severity score, all three contributed to making the VM escape possible:

  • CVE-2025-22226 (CVSS 7.1) – an out-of-bounds read in the Host-Guest File System (HGFS) that could leak memory from the hypervisor process
  • CVE-2025-22224 (CVSS 9.3) – a time-of-check/time-of-use (TOCTOU) flaw in the Virtual Machine Communication Interface (VMCI) that could lead to code execution
  • CVE-2025-22225 (CVSS 8.2) – an arbitrary write issue that enables sandbox escape to the ESXi kernel

Strong clues from the malicious toolkit suggest it was created well before VMware’s advisory. In some of the build paths inside the exploit binaries, analysts found folders with simplified Chinese text and timestamps indicating development activity more than a year before the vulnerabilities became public. This timing points to a scenario where the exploit toolkit was likely developed as a zero-day weapon that was used covertly before disclosure.

The attackers used the SonicWall VPN compromise to gain elevated privileges inside the victim’s environment — even leveraging a Domain Admin account to spread and execute their tools. From there, they deployed the toolkit that disabled certain VMware drivers, injected unsigned kernel code, and established a covert backdoor into the hypervisor itself.

This type of VM escape is especially dangerous: it breaks the fundamental isolation that virtualization promises, letting threat actors move from a guest VM into full control of the host. Once inside the hypervisor, attackers can access all virtual machines running on that system.

Although researchers have not publicly attributed the campaign to any specific group, the use of simplified Chinese in build artifacts and the sophistication of the toolkit suggest a well-resourced developer operating in a Chinese-speaking region.

Security experts warn that this discovery underscores the need for prompt patching of virtualized infrastructure and careful monitoring of VPN appliances and other entry points that can give attackers an initial foothold.

The complete exploitation flow Source: Huntress

Read more

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

ClickFix Campaign Compromises Legitimate Sites to Deploy MIMICRAT — A Custom C++ RAT With 22 Post-Exploitation Commands

Elastic Security Labs has disclosed a new ClickFix campaign that leverages compromised legitimate websites as delivery infrastructure to deploy a previously undocumented remote access trojan dubbed MIMICRAT (also tracked as AstarionRAT). The campaign, discovered earlier this month, demonstrates significant operational sophistication — from multi-stage PowerShell chains that bypass Windows security controls

By Zero Day Wire
ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

ShinyHunters Linked to Device Code Vishing Attacks Targeting Microsoft Entra Accounts via OAuth 2.0 Abuse

A new wave of attacks is combining voice phishing (vishing) with OAuth 2.0 device authorization abuse to compromise Microsoft Entra accounts at technology, manufacturing, and financial organizations — bypassing traditional phishing infrastructure entirely. Sources told BleepingComputer they believe the ShinyHunters extortion gang is behind the campaigns, which the threat actors

By Zero Day Wire