Impact Evaluation of CVE-2026-43284, CVE-2026-43500, and CVE-2026-46300 (Dirty Frag/Fragnesia) of VMware by Broadcom product portfolio
search cancel

Impact Evaluation of CVE-2026-43284, CVE-2026-43500, and CVE-2026-46300 (Dirty Frag/Fragnesia) of VMware by Broadcom product portfolio

book

Article ID: 439687

calendar_today

Updated On:

Products

VMware

Issue/Introduction

Two local privilege escalation (LPE) vulnerabilities, designated as CVE-2026-43284 and CVE-2026-43500 (collectively referred to as "Dirty Frag"), were publicly disclosed on May 7, 2026, affecting the Linux kernel.

A similar local privilege escalation (LPE) vulnerability, designated as CVE-2026-46300 (referred to as “Fragnesia") was disclosed on May 13, 2026.

These vulnerabilities allow an unprivileged local attacker to trigger a deterministic, controlled memory write directly into the page cache of read-only files. Successful exploitation on affected Linux kernels results in unauthorized escalation to root privileges.

Environment

VMware Photon OS
VMware vSphere Kubernetes Service
VMware vCenter Server
VMware ESXi
VMware SDDC Manager
VMware Aria Suite
VMware NSX
VMware vCloud
Telco Cloud Automation 

Cause

The vulnerability is caused by chaining two specific flaws: the xfrm-ESP Page-Cache Write and RxRPC Page-Cache Write vulnerabilities. When an attacker utilizes the splice() system call to map a read-only file (such as /etc/passwd or /usr/bin/su) into a network buffer fragment (sk_buff), the receiver-side kernel incorrectly performs in-place cryptographic operations directly on that fragment. This bypasses copy-on-write protections, unintentionally overwriting the read-only page cache in RAM and altering the file for all subsequent system reads.

For a successful exploitation, an attacker requires network and authenticated access to the relevant system. As per today, this vulnerability can not be exploited remotely or without previously being successfully authenticated to the system in question.

Resolution

ProductExploitable/Fixed inNotes
VMware ESXiNoVMware ESXi is not based on Linux, and hence is not affected.
VMware Photon OSNoPhoton OS restricts standard users from creating user namespaces, and no user namespaces are defined by default
VMware vCenter ServerNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware vSphere Kubernetes Service - SupervisorNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware Tanzu Kubernetes Release - Photon OS ImagesNoPhoton OS is not affected.
VMware Tanzu Kubernetes Release - Ubuntu ImagesRefer to KB 440587Virtual Appliance is based on Ubuntu OS (22.04 and 24.04)
VMware SDDC ManagerNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware NSXNo
  • Appliance Exposure Assessment: NSX Manager and Edge appliances operate as closed system on Ubuntu. Standard users are not granted shell access, and only fully authenticated administrators possess console or SSH access. This closed administrative architecture structurally neutralizes the local privilege escalation threat model for the NSX appliance itself.
  • IDS/IPS Capability: The NSX Distributed IDS/IPS cannot detect or prevent discussed CVEs. Because the exploit is executed locally within host memory using standard internal system calls, it generates no inspectable network traffic for network-based IDS/IPS engines to analyze.
VMware Aria OperationsNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware Aria Operations for LogsNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware Aria AutomationNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware Aria Automation OrchestratorNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware Aria Suite Lifecycle ManagerNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware vCloud DirectorNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware vCloud Usage MeterNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware vSphere ReplicationNoVirtual Appliance is based on Photon OS, and hence is not affected.
VMware Live Site RecoveryNoVirtual Appliance is based on Photon OS, and hence is not affected.
Telco Cloud Automation NoTCA Manager and TCA Control Plane virtual Appliances are based on Photon OS, and hence are not affected.

Should you require further information or support, contact Broadcom Support.
To be notified on any changes, subscribe to this knowledge base article.