Back to Articles
critical

VMware ESXi VM Escape Vulnerability: Patch CVE-2026-22972 Now

Critical VMware ESXi flaw lets attackers escape guest VMs and execute code on the hypervisor. If you run ESXi, this needs immediate patching.

By Danny Mercer, CISSP — Lead Security Analyst Mar 20, 2026 7 views
Is your business exposed? Our McKinney-based security team can assess your risk for free.
Share:

Executive Summary

CVE-2026-22972 is a VM escape vulnerability. Attackers with guest admin privileges can break out to hypervisor with root access via use-after-free in virtual USB controller emulation.

Technical Analysis

Exploitation requires compromising a guest VM first, then leveraging USB controller operations to corrupt hypervisor memory. Affects ESXi 7.0 and 8.0.

Remediation

Patch ESXi immediately. Remove virtual USB controllers from VMs where not required. Prioritize hosts running mixed-trust or multi-tenant workloads.

References

Concerned about this threat?

Our security team can assess your exposure and recommend immediate actions.

Get a Free Assessment →