• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa adds actively exploited vmware aria operations flaw cve 2026 22719 to

CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog

You are here: Home / General Cyber Security News / CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
March 4, 2026

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild.

The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an unauthenticated attacker to execute arbitrary commands.

“A malicious unauthenticated actor may exploit this issue to execute arbitrary commands, which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress,” the company said in an advisory released late last month.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

The shortcoming was addressed, along withCVE-2026-22720, a stored cross-site scripting vulnerability, and CVE-2026-22721, a privilege escalation vulnerability that could result in administrative access. It impacts the following products –

  • VMware Cloud Foundation and VMware vSphere Foundation 9.x.x.x – Fixed in 9.0.2.0
  • VMware Aria Operations 8.x – Fixed in 8.18.6

Customers who cannot apply the patch immediately can download and run a shell script (“aria-ops-rce-workaround.sh”) as root from each Aria Operations Virtual Appliance node.

There are currently no details on how the vulnerability is being exploited in the wild, who is behind it, and the scale of such efforts.

“Broadcom is aware of reports of potential exploitation of CVE-2026-22719 in the wild, but we cannot independently confirm their validity,” the company noted in an update to its bulletin.

In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are required to apply the fixes by March 24, 2026.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «fake tech support spam deploys customized havoc c2 across organizations Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
  • Fake Tech Support Spam Deploys Customized Havoc C2 Across Organizations
  • Building a High-Impact Tier 1: The 3 Steps CISOs Must Follow
  • Open-Source CyberStrikeAI Deployed in AI-Driven FortiGate Attacks Across 55 Countries
  • AI Agents: The Next Wave Identity Dark Matter – Powerful, Invisible, and Unmanaged
  • Starkiller Phishing Suite Uses AitM Reverse Proxy to Bypass Multi-Factor Authentication
  • Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets
  • Google Confirms CVE-2026-21385 in Qualcomm Android Component Exploited
  • SloppyLemming Targets Pakistan and Bangladesh Governments Using Dual Malware Chains
  • New Chrome Vulnerability Let Malicious Extensions Escalate Privileges via Gemini Panel

Copyright © TheCyberSecurity.News, All Rights Reserved.