By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
Computing

China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines

News Room
Last updated: 2026/01/09 at 2:14 PM
News Room Published 9 January 2026
Share
China-Linked Hackers Exploit VMware ESXi Zero-Days to Escape Virtual Machines
SHARE

Jan 09, 2026Ravie LakshmananVirtualization / Vulnerability

Chinese-speaking threat actors are suspected to have leveraged a compromised SonicWall VPN appliance as an initial access vector to deploy a VMware ESXi exploit that may have been developed as far back as February 2024.

Cybersecurity firm Huntress, which observed the activity in December 2025 and stopped it before it could progress to the final stage, said it may have resulted in a ransomware attack.

Most notably, the attack is believed to have exploited three VMware vulnerabilities that were disclosed as zero-days by Broadcom in March 2025: CVE-2025-22224 (CVSS score: 9.3), CVE-2025-22225 (CVSS score: 8.2), and CVE-2025-22226 (CVSS score: 7.1). Successful exploitation of the issue could permit a malicious actor with admin privileges to leak memory from the Virtual Machine Executable (VMX) process or execute code as the VMX process.

That same month, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) added the flaw to the Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation.

“The toolkit analyzed […] also includes simplified Chinese strings in its development paths, including a folder named ‘全版本逃逸–交付’ (translated: ‘All version escape – delivery’), and evidence suggesting it was potentially built as a zero-day exploit over a year before VMware’s public disclosure, pointing to a well-resourced developer likely operating in a Chinese-speaking region,” researchers Anna Pham and Matt Anderson said.

Cybersecurity

The assessment that the toolkit weaponizes the three VMware shortcomings is based on the exploit’s behavior, its use of Host-Guest File System (HGFS) for information leaking, Virtual Machine Communication Interface (VMCI) for memory corruption, and shellcode that escapes to the kernel, the company added.

The toolkit involves multiple components, chief among them being “exploit.exe” (aka MAESTRO), which acts as the orchestrator for the entire virtual machine (VM) escape by making use of the following embedded binaries –

  • devcon.exe, to disable VMware’s guest-side VMCI drivers
  • MyDriver.sys, an unsigned kernel driver containing the exploit that’s loaded into kernel memory using an open-source tool called Kernel Driver Utility (KDU), following which the exploit status is monitored and the VMCI drivers are re-enabled
VM Escape exploitation flow

The driver’s main responsibility is to identify the exact ESXi version running on the host and trigger an exploit for CVE-2025-22226 and CVE-2025-22224, ultimately allowing the attacker to write three payloads directly into VMX’s memory –

  • Stage 1 shellcode, to prepare the environment for the VMX sandbox escape
  • Stage 2 shellcode, to establish a foothold on the ESXi host
  • VSOCKpuppet, a 64-bit ELF backdoor that provides persistent remote access to the ESXi host and communicates over VSOCK (Virtual Sockets) port 10000

“After writing the payloads, the exploit overwrites a function pointer inside VMX,” Huntress explained. “It first saves the original pointer value, then overwrites it with the address of the shellcode. The exploit then sends a VMCI message to the host to trigger VMX.”

VSOCK communication protocol between client.exe and VSOCKpuppet

“When VMX handles the message, it follows the corrupted pointer and jumps to the attacker’s shellcode instead of legitimate code. This final stage corresponds to CVE-2025-22225, which VMware describes as an ‘arbitrary write vulnerability’ that allows ‘escaping the sandbox.'”

Because VSOCK offers a direct communication pathway between guest VMs and the hypervisor, the threat actors have been found to employ a “client.exe” (aka GetShell Plugin) that can be used from any guest Windows VM on the compromised host and send commands back up to the compromised ESXi and interact with the backdoor. The PDB path embedded in the binary reveals it may have been developed in November 2023.

Cybersecurity

The client supports the ability to download files from ESXi to the VM, upload files from the VM to ESXi, and execute shell commands on the hypervisor. Interestingly, the GetShell Plugin is dropped to the Windows VM in the form of a ZIP archive (“Binary.zip”), which also includes a README file with usage instructions, giving an insight into its file transfer and command execution features.

It’s currently not clear who is behind the toolkit, but the use of simplified Chinese, coupled with the sophistication of the attack chain and the abuse of zero-day vulnerabilities months before public disclosure, likely points to a well-resourced developer operating in a Chinese-speaking region, theorized Huntress.

“This intrusion demonstrates a sophisticated, multi-stage attack chain designed to escape virtual machine isolation and compromise the underlying ESXi hypervisor,” the company added. “By chaining an information leak, memory corruption, and sandbox escape, the threat actor achieved what every VM administrator fears: full control of the hypervisor from within a guest VM.”

“The use of VSOCK for backdoor communication is particularly concerning, it bypasses traditional network monitoring entirely, making detection significantly harder. The toolkit also prioritizes stealth over persistence.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 30 of the best gadgets we’ve used at CES 2026 30 of the best gadgets we’ve used at CES 2026
Next Article Sorry ‘Bridgerton,’ but ‘Heated Rivalry’ is actually the most romantic (and horniest) show on TV Sorry ‘Bridgerton,’ but ‘Heated Rivalry’ is actually the most romantic (and horniest) show on TV
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Vivo X200 to offer long range offline connectivity & Dimensity 9400 · TechNode
Vivo X200 to offer long range offline connectivity & Dimensity 9400 · TechNode
Computing
Best monitor deal: Get the Samsung Odyssey G8 QD-OLED gaming monitor for its lowest price yet
Best monitor deal: Get the Samsung Odyssey G8 QD-OLED gaming monitor for its lowest price yet
News
I just watched the ‘Industry’ season 4 premiere and it’s the same delightfully unhinged show I fell in love with
I just watched the ‘Industry’ season 4 premiere and it’s the same delightfully unhinged show I fell in love with
News
WeChat begins beta testing for HarmonyOS NEXT · TechNode
WeChat begins beta testing for HarmonyOS NEXT · TechNode
Computing

You Might also Like

Vivo X200 to offer long range offline connectivity & Dimensity 9400 · TechNode
Computing

Vivo X200 to offer long range offline connectivity & Dimensity 9400 · TechNode

3 Min Read
WeChat begins beta testing for HarmonyOS NEXT · TechNode
Computing

WeChat begins beta testing for HarmonyOS NEXT · TechNode

1 Min Read
Ubisoft issues ambiguous response to Tencent buyout speculations · TechNode
Computing

Ubisoft issues ambiguous response to Tencent buyout speculations · TechNode

1 Min Read
Dead or Alive app designed for people living alone sparks debate in China · TechNode
Computing

Dead or Alive app designed for people living alone sparks debate in China · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?