Cybersecurity firm Huntress discovered Chinese-linked threat actors exploiting VMware ESXi zero-days to escape virtual machines and compromise hypervisors. Evidence suggests the exploit toolkit—dubbed MAESTRO—was built as early as February 2024, a full year before VMware publicly disclosed the vulnerabilities in March 2025.

Campaign overview

AttributeDetails
DiscoveryHuntress
Toolkit nameMAESTRO
VulnerabilitiesCVE-2025-22224, CVE-2025-22225, CVE-2025-22226
Development dateFebruary 2024 (estimated)
Observed exploitationDecember 2025
AttributionChinese-speaking region (assessed)
ESXi versions supported155 builds (5.1 through 8.0)
Exposed instances30,000+ globally

Timeline

DateEvent
February 2024Estimated MAESTRO toolkit development
March 2025VMware publicly discloses CVE-2025-22224, CVE-2025-22225, CVE-2025-22226
March 2025Patches released for ESXi 7.x and 8.x
December 2025Huntress observes active exploitation
January 8, 2026Shadowserver identifies 30,000+ exposed ESXi instances
January 9, 2026Huntress publishes analysis

Vulnerabilities exploited

The attack chains three VMware flaws disclosed as zero-days in March 2025:

CVECVSSTypeDescription
CVE-2025-222249.3TOCTOU → OOB WriteRace condition in VMCI leading to out-of-bounds write; code execution as VMX
CVE-2025-222258.2Arbitrary WriteVMX sandbox escape to ESXi kernel via arbitrary write primitive
CVE-2025-222267.1OOB ReadInformation leak in HGFS; leaks VMX process memory to bypass ASLR

Together, these enable full VM escape—breaking out of a guest virtual machine to control the hypervisor.

Exploitation chain

StepVulnerabilityAction
1CVE-2025-22226Leak VMX memory to defeat ASLR
2CVE-2025-22224Exploit VMCI TOCTOU for code execution in VMX
3CVE-2025-22225Escape VMX sandbox to ESXi kernel
4Deploy VSOCKpuppet backdoor

The attack chain (December 2025)

Huntress observed and stopped the attack before completion:

PhaseActionDetails
1Initial accessCompromised SonicWall VPN appliance
2Credential theftObtained Domain Admin account
3Lateral movementPivoted via RDP across network
4StagingPrepared data for exfiltration
5VM escapeDeployed MAESTRO toolkit
6Hypervisor compromiseGained control of ESXi host
7Intended goalLikely ransomware deployment (stopped)

MAESTRO exploit toolkit

The toolkit contains four components working together:

MAESTRO (exploit.exe)

The orchestrator that coordinates the VM escape:

FunctionDescription
Driver managementDisables VMware VMCI devices with devcon.exe
Driver loadingLoads unsigned exploit driver via KDU
ExploitationMonitors exploit success across components
CleanupRestores drivers after exploitation
Version detectionIdentifies ESXi build for appropriate offsets

MyDriver.sys

Unsigned kernel driver that executes the escape:

CapabilityDetails
ESXi version detectionIdentifies target build
VMX memory leakageExploits CVE-2025-22226
VMCI exploitationTriggers CVE-2025-22224
Sandbox escapeLeverages CVE-2025-22225
Build support155 ESXi builds (versions 5.1–8.0)

The driver includes hardcoded offsets for 155 different ESXi builds, demonstrating significant reverse engineering investment.

VSOCKpuppet

ELF backdoor running on the compromised ESXi host:

FeatureDescription
CommunicationVSOCK (VM-to-hypervisor interface)
Command executionFull shell access on ESXi
File transferUpload/download capabilities
StealthInvisible to network monitoring
PersistenceSurvives VM operations

GetShell Plugin (client.exe)

Windows VSOCK client for communication:

FunctionDescription
ConnectionEstablishes VSOCK link to VSOCKpuppet
ControlSends commands to compromised ESXi
AccessEnables persistent access from any guest VM

VSOCKpuppet: The invisible backdoor

VSOCKpuppet deserves special attention. Rather than using traditional network sockets, it communicates over VSOCK—VMware’s high-speed interface for guest-to-hypervisor communication.

Why VSOCK is dangerous

FactorImplication
No network visibilityVSOCK traffic doesn’t traverse network interfaces
Firewall bypassFirewalls don’t filter VSOCK connections
IDS/IPS blind spotSecurity systems can’t inspect this traffic
EDR limitationsMost endpoint agents don’t monitor VSOCK
IR challengesStandard forensics may miss the backdoor

Detection challenges

Traditional toolVisibility
Network monitoringNone
Firewall logsNone
NetFlow/IPFIXNone
Packet captureNone
ESXi host monitoringPossible with specialized tools

Attribution

Huntress assesses the developer is likely operating in a Chinese-speaking region:

EvidenceDetails
Language stringsSimplified Chinese in development paths
Folder name”全版本逃逸—交付” (“All version escape — delivery”)
SophisticationWell-resourced development over extended period
Zero-day accessPre-disclosure exploitation indicates state-level capabilities
Target selectionConsistent with espionage objectives
Development timelineYear-long lead time suggests formal program

The combination of pre-disclosure zero-day access, extensive version support (155 builds), and sophisticated evasion techniques points to a well-funded operation.

Internet exposure

Shadowserver Foundation data (January 8, 2026) shows significant exposure:

MetricValue
Internet-exposed ESXi instances30,000+
Vulnerable to CVE-2025-22224Majority of exposed instances
Running EOL versions (5.x, 6.x)Significant portion
Geographic concentrationEnterprise data centers, hosting providers

Affected versions

VersionPatch statusRecommendation
ESXi 8.0Patch availableUpdate immediately
ESXi 7.0Patch availableUpdate immediately
ESXi 6.7End-of-lifeMigrate to supported version
ESXi 6.5End-of-lifeMigrate to supported version
ESXi 6.0End-of-lifeMigrate to supported version
ESXi 5.xEnd-of-lifeMigrate to supported version

The MAESTRO toolkit supports 155 builds across all these versions.

Detection guidance

YARA rules

Huntress published YARA rules for detecting MAESTRO components:

RuleDetects
MAESTRO_Orchestratorexploit.exe main binary
MyDriver_ESXi_ExploitUnsigned kernel driver
VSOCKpuppet_BackdoorESXi ELF backdoor
GetShell_ClientWindows VSOCK client

Sigma rules

RuleDetection
ESXi exploitation artifactsUnusual driver loading patterns
VSOCK communication anomaliesUnexpected VSOCK usage
Post-exploitation behaviorLateral movement indicators

Manual hunting

LocationWhat to look for
Guest VMsexploit.exe, client.exe, MyDriver.sys
ESXi hostsUnexpected ELF binaries in /tmp or /var
NetworkRDP from unusual sources
ADDomain Admin usage anomalies

Recommendations

Immediate actions

PriorityAction
CriticalPatch ESXi 7.0 and 8.0 immediately
CriticalMigrate off ESXi 6.x and 5.x — No patches available
CriticalAudit SonicWall VPNs — Common initial access vector
HighHunt for VSOCKpuppet — Check ESXi hosts for unexpected ELF binaries
HighReview Domain Admin accounts — Attackers pivoted using compromised credentials

Network security

ControlPurpose
VPN patchingAddress SonicWall and similar vulnerabilities
Network segmentationIsolate hypervisor management networks
Access controlsRestrict ESXi management to jump hosts
MFARequire for all administrative access

Monitoring

CapabilityImplementation
ESXi host integrityMonitor for unexpected binaries
VSOCK auditingEnable if available
Behavioral analysisDetect unusual hypervisor activity
Driver loadingAlert on unsigned driver installation

Context

This attack demonstrates that:

RealityImplication
VM isolation is not absoluteEscape is possible with right vulnerabilities
Zero-days exploited before disclosureSophisticated actors have year-long advantages
Hypervisor compromise is catastrophicAll guest VMs are compromised
EOL software is indefensibleNo patches means no protection
VSOCK creates blind spotsTraditional monitoring misses this traffic

The MAESTRO toolkit’s support for 155 ESXi builds—spanning nearly a decade of releases—shows the level of investment sophisticated threat actors make in maintaining exploitation capabilities. Organizations running VMware infrastructure should treat this as a wake-up call to patch aggressively, migrate off unsupported versions, and implement monitoring that can detect hypervisor-level compromise.