Fixing and finding
Jump to remediation plan
CVE ID

CVE-2026-22719

Published 2026-02-26
Updated 2 months ago
Vendor/s
Broadcom
Product/s
VMware Aria Operations
Version/s
8.0 > 8.18.6
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
8.1
/ 10
High
Severity Details
Base score
8.1 High
Attack vector
Network
Attack complexity
High
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2026-22719 is a high-severity command injection flaw in VMware Aria Operations allowing unauthenticated RCE. Patch affected systems immediately.

CPE

Broadcom logo
Broadcom
Product Version Start Version End (excl.) Status
aria_operations 8.0 8.18.6 vulnerable
cloud_foundation 4.0 5.2.3 vulnerable
cloud_foundation 9.0 9.0.2.0 vulnerable
telco_cloud_infrastructure 2.2 3.0 vulnerable
telco_cloud_platform 4.0 5.1 vulnerable

Related weakness (CWE)

CWE-77

Remediation plan

1

Apply official patches

Follow the instructions in Broadcom's VMSA-2026-0001 advisory to apply the specific security patches for VMware Aria Operations and VMware Cloud Foundation.

2

Update affected systems

Upgrade VMware Aria Operations to version 8.18.6 or higher, and ensure Cloud Foundation is updated to version 5.2.3 or 9.0.2.0 as specified in the vendor response matrix.

3

Restrict access

Limit network access to the Aria Operations management interface to trusted administrative subnets and disable support-assisted migration features when not in use.

4

Monitor for exploitation

Review system logs for unusual shell command execution or unauthorized network connections originating from the Aria Operations appliance, particularly during migration windows.

Detection Guidance

Organizations should monitor Aria Operations logs for unexpected process spawns or shell commands initiated by web service accounts. Look for unusual outbound traffic from the management appliance, especially during migration activities. Network-based detection should focus on HTTP requests containing command injection payloads targeting migration-related endpoints. Reviewing Broadcom’s specific KB articles for file-based indicators or modified system configurations is also recommended.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management