It's of axioms; every progress that is devised in the field of facilitating daily life through technology is matched by many complications in terms of the methods that led to the creation of these inventions and how to maintain their sustainability, consistency, and development. In digital world that became not only as axiom of its nature, but it is now one of the main inherent features that define digital technology. Whereas Major international companies are in a big race to produce the new development and invention of their products to be supplied to markets, and all of that should be conquered within not more than a year. The immersion in that big race has to be armed with patience and deep breath. Keywords-Cloud computing; virtual machine escape; cloud security; impact of VM escape; VM escape counter measures; VM escape nature I. INTRODUCTION With virtualization world, that accelerating, competitive, and pervasive environment, you would be plagued and dominated by many restrictions and vectors in terms of acquisition of business solutions. Hence, it's effortless to build a compute of the given resources in virtualization atmosphere, in other word; we can build virtual storages, virtual CPU's, virtual memory, etc. as much as we need, where & when needed within minutes or seconds [1]. This steady, fast, exaggerated and easy increase in the nature of virtualization which is intrinsic characteristic of it compels us to dealing with a proxy-managed property. However, in virtualization each step has been made could expose us to be in the middle of a mud. Yet, we could characterize virtualization as a muddy, very flabby, slimy texture of logical components (Virtual Machine, Hypervisor, O.S.), leading to be parachuted uncovered in a confrontation with that exaggerated sprawl/stretching Orbit [2]. With all of the above, it's uneasy to hold that emulated components of virtualization entity close enough together to be functioned, give rise to a notorious vulnerability in Virtual Machines.