VMware Fusion: Attackers can gain root privileges

Broadcom developers have released an important security patch for VMware Fusion.

listen Print view
A symbolic update button on a keyboard.

(Image: Tatiana Popova/Shutterstock.com)

1 min. read

If attackers successfully exploit a vulnerability in VMware Fusion, they can gain root user privileges under certain conditions. The developers have now closed the gap.

VMware Fusion is used to create virtual machines under macOS. Attackers can exploit a race condition vulnerability (TOCTOU, Time-of-Check to Time-of-Use) in a binary file with SETUID. In such a case, attackers exploit a specific time span between checking and using a resource to manipulate the resource and cause damage.

Videos by heise

In this case, they can gain root privileges through an unspecified method and subsequently gain full control with high probability (CVE-2026-41702 "high"). However, attackers must already be authenticated as a prerequisite for an attack.

Version 25H2 of VMware Fusion is affected. The developers assure that version 26H1 has been repaired. So far, there are no reports of attacks.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.