VMware Fusion High-Security Update Fixes Critical Vulnerability

www.news4hackers.com-vmware-fusion-high-security-update-fixes-critical-vulnerability-vmware-fusion-high-security-update-fixes-critical-vulnerability

VMware Releases Patch to Address High-Security Vulnerability

Last week, VMware’s parent company, Broadcom, issued a software update to address a high-severity vulnerability affecting their popular virtualization product, VMware Fusion.

  • The vulnerability, identified as CVE-2026-41702, is a type of time-of-check time-of-use (TOCTOU) flaw that occurs when a SETUID binary performs an operation.
  • A malicious actor with local non-administrative user privileges could potentially exploit this vulnerability to escalate privileges to root on the affected system.
According to the advisory, “a malicious actor with local non-administrative user privileges could potentially exploit this vulnerability to escalate privileges to root on the affected system.”

Broadcom has also indicated that they may release additional patches in the coming days, particularly following the upcoming Pwn2Own hacking competition. Notably, VMware has removed its Workstation product from the list of targets, although other VMware products are still expected to be vulnerable.

Vulnerabilities in VMware Products

  • The CISA KEV catalog currently lists 26 known vulnerabilities in various VMware products.
  • These vulnerabilities highlight the importance of regular updates and patches to maintain the security and integrity of critical infrastructure.

Experts recommend that users ensure they have the latest version of VMware Fusion installed, particularly those who rely heavily on virtualization technology. As always, timely patching and vigilant monitoring of potential threats remain essential components of robust cybersecurity practices.

Timeline

  • Date: Last week
  • Vulnerability ID: CVE-2026-41702
  • Type: Time-of-check time-of-use (TOCTOU) flaw
  • Potential impact: Privilege escalation to root on the affected system
  • Patches available: Yes, via Broadcom update
  • Related events: Pwn2Own hacking competition



About Author

en_USEnglish