9th January 2026 Cyber Update: Chinese-Linked Hackers Exploit VMware Zero-Days to Escape Virtual Machines

A sophisticated Chinese-speaking threat actor has been caught exploiting a trio of VMware ESXi zero-day vulnerabilities, allowing them to escape virtual machines and gain full control of the underlying hypervisor.

9th January 2026 Cyber Update: Chinese-Linked Hackers Exploit VMware Zero-Days to Escape Virtual Machines
Photo by Shamin Haky

Cyber News Centre's cyber update for 9th January 2026: A highly sophisticated, likely state-sponsored threat actor has been discovered exploiting a chain of VMware ESXi zero-day vulnerabilities to achieve a full virtual machine escape, a nightmare scenario for any organisation relying on virtualisation for security and segmentation.

VMware, a subsidiary of Broadcom, is a global leader in cloud computing and virtualisation software and services. Its ESXi hypervisor is a bare-metal hypervisor that is widely used in enterprise data centers for managing and partitioning server hardware.

The Update and Why It Matters

Update: Cybersecurity firm Huntress has uncovered a sophisticated attack campaign targeting VMware ESXi, leveraging a trio of vulnerabilities (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) to escape from a guest virtual machine and seize control of the underlying hypervisor. The attack, observed in December 2025, began with initial access through a compromised SonicWall VPN.

The threat actor, assessed to be a well-resourced Chinese-speaking group, then moved laterally to a domain controller and deployed a custom toolkit. This toolkit, which includes components named "MAESTRO" and "VSOCKpuppet," was likely developed as far back as February 2024, more than a year before VMware disclosed and patched the zero-day flaws in March 2025.

The exploit chain is complex, involving the disabling of VMware's own communication drivers, loading a malicious unsigned kernel driver, and using a combination of memory leak and arbitrary write vulnerabilities to break out of the VMX sandbox and establish a persistent backdoor on the ESXi host. This backdoor communicates over Virtual Sockets (VSOCK), a method that bypasses traditional network monitoring, making detection extremely difficult.

Why it Matters: This incident is a stark reminder that virtualisation does not equal isolation. The ability for an attacker to "escape" a virtual machine and compromise the hypervisor effectively dismantles the security architecture of a modern data center, exposing every other virtual machine on that host to compromise.

The attack demonstrates a level of sophistication and long-term planning characteristic of nation-state actors, who possess the resources to discover and weaponise zero-day vulnerabilities long before they are known to the public. The initial access vector—a compromised VPN—also highlights that even the most advanced attacks often begin by exploiting basic security hygiene failures.

With over 30,000 ESXi instances still exposed to the internet and potentially vulnerable, this campaign represents a significant and ongoing threat to enterprise and government networks, reinforcing the critical need for aggressive patching, network segmentation, and hypervisor-level security monitoring.


Get the stories that matter to you.
Subscribe to Cyber News Centre and update your preferences to follow our Daily 4min Cyber Update, Innovative AI Startups, The AI Diplomat series, or the main Cyber News Centre newsletter — featuring in-depth analysis on major cyber incidents, tech breakthroughs, global policy, and AI developments.

Great! You’ve successfully signed up.

Welcome back! You've successfully signed in.

You've successfully subscribed to Cyber News Centre.

Success! Check your email for magic link to sign-in.

Success! Your billing info has been updated.

Your billing was not updated.