[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fOQOJYQ1z8masnAue9PG27xEoas4u2jI8w0xXrjd92e4":3},{"article":4,"iocs":42},{"id":5,"title":6,"slug":7,"summary":8,"ai_summary":9,"brief":10,"full_text":11,"url":12,"image_url":13,"published_at":14,"ingested_at":15,"relevance_score":16,"entities":17,"category_id":29,"category":30,"article_tags":34},"3a025890-2ac1-42e1-8786-7b5553294a44","High-Severity Vulnerability Patched in VMware Fusion","high-severity-vulnerability-patched-in-vmware-fusion-3f3b97","The patch was announced as Broadcom is attending the Pwn2Own hacking competition in Berlin this week. The post High-Severity Vulnerability Patched in VMware Fusion appeared first on SecurityWeek.","Broadcom released a patch for CVE-2026-41702, a high-severity time-of-check time-of-use (TOCTOU) vulnerability in VMware Fusion that allows local non-administrative users to escalate privileges to root. The vulnerability was reported by Mathieu Farrell. The patch was announced as Broadcom attends Pwn2Own hacking competition in Berlin, where additional VMware patches are expected.","Broadcom patches high-severity TOCTOU privilege escalation flaw in VMware Fusion.","Broadcom announced on Thursday that it has released a VMware Fusion update to patch a high-severity vulnerability. The flaw, tracked as CVE-2026-41702 and rated ‘important’ by the vendor, was reported by Mathieu Farrell. An advisory describes CVE-2026-41702 as a time-of-check time-of-use (TOCTOU) flaw that “occurs during an operation performed by a SETUID binary”. “A malicious actor with local non-administrative user privileges may exploit this vulnerability to escalate privileges to root on the system where Fusion is installed,” the advisory explains. VMware may announce several more patches in the coming days, as its products will be targeted at this week’s Pwn2Own hacking competition. VMware owner Broadcom has sent members of its security team to the event, where participants are expected to demonstrate ESX exploits that can earn them up to $200,000. VMware Workstation, which in recent years has earned significant rewards for Pwn2Own participants, has been removed from the list of targets. Advertisement. Scroll to continue reading. Broadcom’s advisory does not mention CVE-2026-41702 being used in attacks, but vulnerabilities in VMware products are often exploited in the wild. CISA’s KEV catalog currently includes 26 VMware flaws. Related: VMware Aria Operations Vulnerability Could Allow Remote Code Execution Related: 2024 VMware Flaw Now in Attackers’ Crosshairs Related: Exploit for VMware Zero-Day Flaws Likely Built a Year Before Public Disclosure Written By Eduard Kovacs Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering. More from Eduard Kovacs Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening EnterprisesHundreds of Malicious Packages Force RubyGems to Suspend RegistrationsICS Patch Tuesday: New Security Advisories From Siemens, Schneider, CISABWH Hotels Says Hackers Had Access to Reservation Data for 6 MonthsApple Patches Dozens of Vulnerabilities in macOS, iOSClaude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really MeansFrame Security Emerges From Stealth With $50M for Awareness and Training PlatformGoogle Detects First AI-Generated Zero-Day Exploit Latest News Hackers Targeted PraisonAI Vulnerability Hours After DisclosureResearcher Drops YellowKey, GreenPlasma Windows Zero-DaysFoxconn Confirms North American Factories Hit by CyberattackMicrosoft, Palo Alto Networks Find Many Vulnerabilities by Using AI on Their Own CodeSweet Security Launches Agentic AI Red Teaming to Counter ‘Mythos Moment’Webinar Today: ROI for Cyber-Physical Security ProgramsGovernment to Scrutinize Instructure Over Canvas Disruption, Data Breach716,000 Impacted by OpenLoop Health Data Breach Trending Daily Briefing NewsletterSubscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts. Webinar: ROSI for CPS Security Programs May 13, 2026 In cyber-physical systems (CPS), just one hour of downtime can outweigh an entire annual security budget. Learn how to master the Return on Security Investment (ROSI) to align security goals with the bottom-line priorities. Register Virtual Event: Threat Detection and Incident Response Summit May 20, 2026 Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization. Register People on the MoveMalwarebytes has named Chung Ip as Chief Financial Officer.Semperis has appointed John Podboy as Chief Information Security Officer.Randy Menon has become Chief Product and Marketing Officer at One Identity.More People On The MoveExpert Insights Is the SOC Obsolete, and We Just Haven’t Admitted It Yet? Many AI-first enterprises have already embraced sovereign architectures for general AI initiatives; cybersecurity—and the SOC—should be next. (Danelle Au) The Mythos Moment: Enterprises Must Fight Agents with Agents Only with the right platform and an agentic, AI-driven defense, will enterprises be able to protect themselves in the agentic era. (Etay Maor) Why Cybersecurity Must Rethink Defense in the Age of Autonomous Agents From autonomous code generation to decision-making systems that initiate actions without human intervention, the industry is entering a new phase. (Torsten George) Government Can’t Win the Cyber War Without the Private Sector Securing national resilience now depends on faster, deeper partnerships with the private sector. (Steve Durbin) The Hidden ROI of Visibility: Better Decisions, Better Behavior, Better Security Beyond monitoring and compliance, visibility acts as a powerful deterrent, shaping user behavior, improving collaboration, and enabling more accurate, data-driven security decisions. (Joshua Goldfarb) Flipboard Reddit Whatsapp Whatsapp Email","https:\u002F\u002Fwww.securityweek.com\u002Fhigh-severity-vulnerability-patched-in-vmware-fusion\u002F","https:\u002F\u002Fwww.securityweek.com\u002Fwp-content\u002Fuploads\u002F2022\u002F08\u002FVMWare.jpg","2026-05-14T08:42:25+00:00","2026-05-14T10:00:24.010261+00:00",8,[18,21,24,26],{"name":19,"type":20},"Broadcom","vendor",{"name":22,"type":23},"VMware Fusion","product",{"name":25,"type":23},"VMware Workstation",{"name":27,"type":28},"Pwn2Own","campaign","80544778-fabb-4dcd-aa35-17492e5dcf4f",{"id":29,"icon":31,"name":32,"slug":33},null,"Vulnerabilities","vulnerabilities",[35,40],{"category":36},{"id":37,"icon":31,"name":38,"slug":39},"02371804-cf6d-4449-98de-f1a2d4d9b266","Tools","tools",{"category":41},{"id":29,"icon":31,"name":32,"slug":33},[43],{"type":44,"value":45,"context":46},"cve","CVE-2026-41702","High-severity TOCTOU privilege escalation in VMware Fusion SETUID binary"]