VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

Jan 12, 2026

Chinese-speaking threat actors were using a sophisticated VMware ESXi exploit toolkit well before the vulnerabilities were publicly disclosed, researchers warn. The exploit allowed attackers to break out of virtual machines and reach the ESXi hypervisor — a critical escalation path that can put entire virtual infrastructures at risk.

In December 2025, managed security firm Huntress analyzed an intrusion where the attackers leveraged a chain of three ESXi vulnerabilities later publicly disclosed in March 2025. Evidence from the exploit binaries suggests the toolkit was developed as early as February 2024, indicating that the bugs may have been in use long before the public disclosure.

What Happened

The threat actors reportedly gained initial access through a compromised SonicWall VPN appliance, then used a stolen Domain Admin account to pivot via RDP to domain controllers. From there, they executed an exploit chain that broke out of a VM into the ESXi hypervisor — a highly privileged aspect of virtualized environments.

This type of “VM escape” is particularly dangerous because it undermines the isolation that virtualization platforms are designed to enforce, potentially exposing all workloads hosted on an ESXi server to compromise.

Exploit Toolkit: What It Does

Investigators found the attackers used a modular toolkit with several components. Here’s a breakdown of the major parts identified by Huntress:

Component

Role

MAESTRO (exploit.exe)

Orchestrates the VM escape by disabling VMCI devices, loading unsigned drivers, and monitoring success.

MyDriver.sys

Unsigned kernel driver that executes the VM escape, handles ESXi version detection, memory leakage, and corruption.

VSOCKpuppet

ELF backdoor on the ESXi host that enables command execution and file transfer over VSOCK, evading traditional monitoring.

GetShell Plugin (client.exe)

Windows client used from inside a VM to connect to the backdoor on the compromised ESXi host and interact with it.

Vulnerabilities Exploited

The exploit chain appears to leverage three VMware ESXi vulnerabilities disclosed by Broadcom in March 2025. These were previously unknown (zero-day) at the time of the December 2025 attack:

CVE

Description

Severity

CVE-2025-22224

TOCTOU flaw in VMCI enabling out-of-bounds write, allowing code execution in VMX.

9.3

CVE-2025-22225

Arbitrary write in ESXi enabling escape from VMX sandbox to kernel.

8.2

CVE-2025-22226

Out-of-bounds read in HGFS that leaks VMX memory.

7.1

At disclosure time, Broadcom warned that these issues could be chained to break out of a virtual machine and reach the underlying hypervisor.

Timeline & Attribution Clues

Huntress researchers found compile paths inside the exploit binaries with date-like folder names such as “2024_02_19” and “2023_11_02”, strongly suggesting development and testing started long before the bugs were publicly disclosed.

Strings in the build paths include simplified Chinese, and the folder names translate to phrases like “All version escape — delivery,” possibly indicating a target of ESXi 8.0 Update 3. Combined with an English readme file, this suggests potential plans to share or sell the toolkit to other operators.

Mitigation & Recommendations

Although Huntress couldn’t confirm with 100% certainty that the toolkit directly aligns with the vulnerabilities Broadcom disclosed, organizations should treat this as a critical wake-up call and take action:

Immediate steps to protect ESXi environments:

  • Apply the latest ESXi patches and updates.

  • Use YARA and Sigma detection rules released by researchers to catch early signs of compromise.

  • Harden VPN appliances and monitor for unusual logins or lateral movement.

  • Monitor VSOCK communication and driver loading activity, which could indicate exploit attempts.

Final Thoughts

This case highlights how advanced threat actors may develop and use exploit toolkits long before vulnerabilities are disclosed, increasing the window of exposure for unpatched infrastructure. Organizations must accelerate patch management, strengthen visibility, and treat hypervisor security as a cornerstone of modern IT defense.

Disclaimer: ClearPhish maintains a strict policy of not participating in the theft, distribution, or handling of stolen data or files. The platform does not engage in exfiltration, downloading, hosting, or reposting any illegally obtained information. Any responsibility or legal inquiries regarding the data should be directed solely at the responsible cybercriminals or attackers, as ClearPhish is not involved in these activities. We encourage parties affected by any breach to seek resolution through legal channels directly with the attackers responsible for such incidents.

Latest News

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn
VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

VMware ESXi Zero-Day Exploits Likely Used a Year Before Disclosure, Researchers Warn

Jan 12, 2026

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers
Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Ni8mare Vulnerability: Max-Severity Flaw Lets Hackers Hijack n8n Automation Servers

Jan 8, 2026

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft
European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

European Space Agency Confirms Data Breach After Hacker Claims 200GB Data Theft

Jan 6, 2026

Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach
Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Ledger Customers Impacted After Global-e Third-Party Data Breach

Jan 6, 2026

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems
ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

ClickFix Malware Attack Uses Fake Windows Update Screens to Infect Systems

Jan 6, 2026

European Space Agency Confirms Breach of External Servers
European Space Agency Confirms Breach of External Servers
European Space Agency Confirms Breach of External Servers
European Space Agency Confirms Breach of External Servers

European Space Agency Confirms Breach of External Servers

European Space Agency Confirms Breach of External Servers

European Space Agency Confirms Breach of External Servers

European Space Agency Confirms Breach of External Servers

Jan 2, 2026

Get updates in your inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Get updates in your

inbox directly

You are now subscribed.

Get updates in your inbox directly

You are now subscribed.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.

Enable your employees as first line of defense and expand your digital footprints without any fear.