Tracked as CVE-2026-41702, the flaw carries a CVSS score of 7.8, marking it as high severity. The issue was officially disclosed by Broadcom, which now oversees VMware products, in its advisory VMSA-2026-0003 released on May 14, 2026.
The vulnerability stems from a Time-of-Check Time-of-Use (TOCTOU) race condition found in a SETUID binary, a class of bugs known for enabling privilege escalation under specific timing conditions.
In simple terms, a TOCTOU flaw occurs when a system checks a condition but fails to ensure it remains unchanged before acting on it. Attackers can exploit this gap by manipulating the system state between the check and execution phases.
In this case, a local attacker with low privileges can abuse the race condition to execute code as the root user.
According to Broadcom, successful exploitation allows attackers to run arbitrary commands, modify sensitive system files, and install persistent malware.
This level of access effectively bypasses all standard security controls, making it a critical risk in both enterprise and individual environments.
The vulnerability was responsibly reported by security researcher Mathieu Farrell, known online as @coiffeur0x90.
While there are currently no reports of active exploitation in the wild, the attack does not require user interaction and has low complexity, increasing its potential for abuse, especially in shared systems or multi-user environments.
The flaw specifically impacts VMware Fusion version 25H2 across all supported platforms. VMware Fusion is widely used by developers, security professionals, and enterprises for virtualization tasks such as testing, sandboxing, and running multiple operating systems. This broad usage significantly expands the potential attack surface.
Broadcom has addressed the issue in VMware Fusion version 26H1, which includes a complete fix.
Notably, there are no available workarounds, meaning patching is the only effective mitigation. Systems running vulnerable versions remain exposed until updated.
Security experts warn that local privilege escalation vulnerabilities like this are often used as part of multi-stage attacks.
For example, an attacker who gains initial low-level access through phishing or another exploit could chain this flaw to achieve full system compromise.
Organizations are strongly advised to update immediately to the patched version. In addition, enforcing least-privilege access controls, restricting local user permissions, and monitoring for unusual system activity can help reduce the risk of exploitation.
This incident highlights the growing focus of attackers on developer tools and virtualization platforms.
As these environments become central to modern workflows, ensuring their security through timely updates and proactive monitoring is more important than ever.
Follow us on Google News , LinkedIn and X to Get More Instant Updates. Set Cyberpress as a Preferred Source in Google
The post VMware Fusion Vulnerability Lets Attackers Escalate Privileges to Root appeared first on Cyber Security News.
Memorial Day weekend isn't this weekend; it's next weekend. But that hasn't stopped Amazon from…
NFL teams have been coming up with creative ways to announce their season schedules in…
No matter where Henry Cavill goes, Warhammer 40,000 seems to follow. The former Superman actor,…
Steelseries' flagship headset is the Arctis Nova Elite, which should be obvious from the $600…
Similar to every other high-end GPU on the market, the AMD Radeon 9070 XT graphics…
Best Buy has dropped some great deals on select games for Nintendo Switch and Nintendo…
This website uses cookies.