Five significant vulnerabilities disclosed this week span Linux kernels, Microsoft Outlook, NGINX web servers, and VMware Fusion — with active exploitation already confirmed or suspected in at least two cases. Microsoft’s June 2026 Patch Tuesday addressed 137 flaws in total, while separate disclosures from Broadcom and F5 added to an already heavy patching week for security teams.
Dirty Frag: Linux Privilege Escalation Already Seeing Exploitation
A local privilege escalation chain dubbed Dirty Frag — tracked as CVE-2026-43284 and CVE-2026-43500 — affects the xfrm-ESP (IPsec) and RxRPC components of the Linux kernel, allowing an unprivileged user to escalate to root. According to SecurityWeek, researcher Hyunwoo Kim discovered the flaw and intended to disclose it responsibly, but a third party made it public before patches were ready — forcing Kim to release full technical details and proof-of-concept code himself.
What makes Dirty Frag particularly dangerous is its reliability. Kim noted that the exploit is “a deterministic logic bug that does not depend on a timing window, no race condition is required, the kernel does not panic when the exploit fails, and the success rate is very high.”
Microsoft said its Defender product has observed limited in-the-wild activity consistent with exploitation of Dirty Frag or its close relative, Copy Fail — a separate Linux kernel flaw that has already been confirmed exploited. Microsoft described a post-exploitation pattern where attackers, after gaining elevated access, modify a GLPI LDAP authentication file and conduct reconnaissance of system configuration.
The vulnerability has the greatest impact on bare-metal Linux hosts. In container environments, exploitation for container escape is theoretically possible but has not yet been demonstrated, Ubuntu developers noted. Attack vectors leading to initial access include compromised SSH accounts, web shells on internet-exposed applications, abused service accounts, and remote access compromise.
CVE-2026-40361: Zero-Click Outlook Flaw Rated ‘Exploitation More Likely’
Among the 137 vulnerabilities patched in Microsoft’s June 2026 Patch Tuesday, one stands out for enterprise risk: CVE-2026-40361, a zero-click use-after-free bug in a DLL shared by both Word and Outlook. Microsoft has assigned it an “exploitation more likely” rating.
Haifei Li, developer of the zero-day detection platform Expmon and the researcher credited with reporting the flaw, posted on X that the vulnerability can be triggered the moment a victim reads or previews an email — no link clicks or attachment opens required. “You definitely want to patch this sooner rather than later,” Li wrote.
Li drew a direct comparison to CVE-2015-6172 (BadWinmail), a flaw he discovered over a decade ago that was described at the time as an “enterprise killer.” He said CVE-2026-40361 shares the same attack vector and potential impact. “Essentially, anyone could compromise a CEO or CFO just by sending an email,” Li explained. “The threat perfectly bypasses enterprise firewalls and is delivered directly to the inbox.”
For organizations that cannot patch immediately, Li identified one viable mitigation: configure Outlook to render emails in plain text only. He cautioned, however, that he has developed only a proof-of-concept — not a working exploit achieving full code execution — meaning the practical exploitation bar remains somewhat higher than the rating implies.
CVE-2026-42945: 16-Year-Old NGINX Bug Gets a PoC Within Days of Patch
A heap buffer overflow in NGINX’s ngxhttprewrite_module, tracked as CVE-2026-42945 with a CVSS score of 9.2, was patched this week as part of F5’s quarterly release — 16 years after the bug was introduced. Within days of the patch, cybersecurity firm Depthfirst published full technical details and proof-of-concept exploit code, according to SecurityWeek.
The flaw affects NGINX servers using rewrite and set directives. It stems from a two-pass script engine process: one pass computes the required buffer size, and a second copies data. Because internal engine state changes between passes, a rewrite replacement containing a question mark causes an undersized buffer allocation. Attacker-controlled escaped URI data is then written past the heap boundary.
Depthfirst explained that padding a request URI with plus signs forces the escaping function to expand each byte into three bytes, creating a controllable overflow. In its default configuration with ASLR enabled, the flaw causes a denial-of-service via worker process restart. Remote code execution is possible when ASLR is disabled — a configuration that exists in some hardened or legacy deployments.
Achieving RCE requires overwriting fields in the NGINX memory pool using cross-request heap manipulation, a complex technique that raises the exploitation bar but does not eliminate the risk for skilled attackers.
CVE-2026-41702: VMware Fusion TOCTOU Flaw Patched Before Pwn2Own
Broadcom patched a high-severity privilege escalation vulnerability in VMware Fusion, tracked as CVE-2026-41702 and rated “important” by the vendor. Reported by researcher Mathieu Farrell, the flaw is a time-of-check time-of-use (TOCTOU) issue that occurs during an operation performed by a SETUID binary, according to Broadcom’s advisory.
A local non-administrative user can exploit the flaw to escalate privileges to root on the host system. Broadcom has not indicated the vulnerability is being actively exploited, but the timing is notable: VMware products are targets at this week’s Pwn2Own hacking competition, where ESX exploits carry prizes of up to $200,000. CISA’s Known Exploited Vulnerabilities catalog already lists 26 VMware flaws, underscoring the historical pattern of VMware bugs attracting real-world attackers.
VMware Workstation, a frequent Pwn2Own target in recent years, has been removed from the competition’s target list for this event.
Claude Mythos Finds One Low-Severity Curl Bug, Raising Questions About AI Vulnerability Claims
A separate story this week complicates the narrative around AI-powered vulnerability discovery. Anthropic’s restricted Claude Mythos model — which the company claimed had identified thousands of zero-days before launch — found just one low-severity vulnerability in curl’s 178,000 lines of code, according to a report shared with curl lead developer Daniel Stenberg and described in SecurityWeek.
Of five issues flagged as “confirmed security vulnerabilities” in the Mythos report, three turned out to be known behaviors documented in official curl documentation, and one was a non-security bug. The single confirmed vulnerability will be patched in late June.
Stenberg noted that other AI tools — including Zeropath, AISLE, and OpenAI’s Codex — previously analyzed curl and collectively surfaced 200–300 issues, including “a dozen or more” confirmed vulnerabilities. He acknowledged that AI-powered analysis is “significantly better” than traditional static analysis tools, but concluded that Mythos is “not as dangerous as Anthropic has described it.”
Experts are divided. Some argue the results reflect curl’s unusually mature security posture rather than Mythos’ limitations — the project has been audited extensively and its codebase is well-hardened. Anthropic has not publicly responded to Stenberg’s findings.
What This Means
This week’s disclosures illustrate three persistent problems in vulnerability management. First, coordinated disclosure is fragile: Dirty Frag went public before patches existed because a third party broke embargo, forcing the researcher’s hand and giving attackers a window with no fix available. Second, zero-click email exploits in Outlook remain one of the highest-impact attack classes for enterprise environments — CVE-2026-40361 requires no user interaction beyond opening an inbox, and Microsoft’s “exploitation more likely” rating signals the security community should treat it as a near-term threat.
Third, the NGINX flaw’s 16-year lifespan before discovery is a reminder that critical bugs can persist in widely deployed infrastructure for decades. The rapid publication of PoC code compresses the patching window significantly — organizations running NGINX with rewrite directives should prioritize the F5 patch regardless of ASLR status.
The Claude Mythos episode is a useful calibration point. AI-assisted vulnerability research is a real capability, but specific claims about model performance should be tested against real-world codebases before being accepted at face value. One low-severity finding in a mature, well-audited project is not evidence of failure — but it is evidence that marketing claims about “thousands of zero-days” warrant scrutiny.
FAQ
What is the Dirty Frag vulnerability and who is affected?
Dirty Frag is a local privilege escalation exploit chaining two Linux kernel flaws — CVE-2026-43284 and CVE-2026-43500 — in the xfrm-ESP (IPsec) and RxRPC components. It affects major Linux distributions, with the greatest impact on hosts running workloads directly on the OS rather than in containers.
Do I need to click anything for CVE-2026-40361 to compromise my Outlook?
No. CVE-2026-40361 is a zero-click vulnerability, meaning it can be triggered simply by reading or previewing an email in Outlook. Microsoft rated it “exploitation more likely,” and the reporting researcher recommends patching immediately or switching Outlook to plain-text email rendering as a temporary mitigation.
Is the NGINX CVE-2026-42945 flaw being actively exploited?
No active exploitation has been confirmed as of this writing, but proof-of-concept code is publicly available, which significantly shortens the window before exploitation attempts begin. Organizations using NGINX with rewrite or set directives should apply F5’s patch from its June 2026 quarterly release without delay.
Sources
- New ‘Dirty Frag’ Linux Vulnerability Possibly Exploited in Attacks – SecurityWeek
- Microsoft Patches Critical Zero-Click Outlook Vulnerability Threatening Enterprises – SecurityWeek
- Claude Mythos Finds Only One Curl Vulnerability; Experts Divided on What It Really Means – SecurityWeek
- High-Severity Vulnerability Patched in VMware Fusion – SecurityWeek
- PoC Code Published for Critical NGINX Vulnerability – SecurityWeek






