Open Nav
Sign Up

Actively Exploited VMware Aria Operations RCE (CVE-2026-22719)

CVE-2026-22719

Filip Dimitrov

March 4, 2026

A high-severity vulnerability in VMware Aria Operations has been added to the Known Exploited Vulnerabilities Catalog, indicating evidence of exploitation in real-world attacks. The vulnerability, tracked as CVE-2026-22719, is a command injection flaw that can allow an unauthenticated attacker to execute arbitrary commands on affected systems and potentially achieve remote code execution (RCE).

The issue was disclosed in February 2026 and assigned a CVSS score of 8.1 (High). It affects VMware Aria Operations deployments used to monitor and manage hybrid cloud and virtualized infrastructure.

Vulnerability Details

CVE ID: CVE-2026-22719
Severity: High (CVSS 8.1)
Type: Command Injection → Potential Remote Code Execution
CWE: CWE-77 (Improper Neutralization of Special Elements used in a Command)

The vulnerability arises from insufficient validation of externally supplied input during certain system operations. If successfully exploited, a malicious actor can inject system commands that are executed by the underlying operating system.

Specifically, the vulnerability is exploitable during support-assisted product migration workflows, which are often used during system upgrades, migrations, or infrastructure transitions. During these operations, the platform executes migration scripts that can be manipulated by attackers to run arbitrary commands.

Because the flaw does not require authentication, attackers may be able to exploit exposed management interfaces without valid credentials.

Additional Related Vulnerabilities

The disclosure was part of a broader security advisory addressing three vulnerabilities in the Aria Operations platform:

CVETypeImpact
CVE-2026-22719Command injectionUnauthenticated command execution leading to RCE
CVE-2026-22720Stored XSSMalicious scripts embedded in custom benchmark definitions
CVE-2026-22721Privilege escalationUsers with certain vCenter privileges may gain admin access

These issues affect environments running VMware Aria Operations 8.x and related cloud platforms, including VMware Cloud Foundation and VMware Telco Cloud environments.

Read the full Broadcom advisory here

Exploitation Status

The vulnerability has been added to the CISA KEV catalog following reports of exploitation attempts in the wild.

However, technical exploitation details and proof-of-concept code have not yet been publicly disclosed, and the vendor has stated it cannot independently confirm the reported exploitation activity.

Historically, VMware infrastructure products have been frequent targets of threat actors, including ransomware operators and state-sponsored groups, due to their central role in managing virtualized environments.

Potential Impact

Successful exploitation could allow attackers to:

  • Execute arbitrary commands on the Aria Operations appliance
  • Gain remote code execution on management infrastructure
  • Access sensitive monitoring and configuration data
  • Pivot to connected systems such as vCenter or cloud management components
  • Escalate privileges within enterprise virtualization environments

Because Aria Operations serves as a centralized monitoring and orchestration layer for hybrid and multi-cloud infrastructure, compromise of the platform could expose critical operational systems and infrastructure telemetry.

Mitigation and Remediation

For organizations running VMware Aria Operations (or products that bundle it), OP Innovate strongly recommends:

Patch VMware Aria Operations to 8.18.6 (or the vendor-recommended fixed release for your branch) and apply the relevant fixed versions for bundled platforms (e.g., VCF Operations 9.0.2.0).

If you cannot patch immediately, apply the official workaround, available here.

Restrict Aria Operations management access to trusted admin networks/VPN only.

Implement firewall rules / network segmentation to limit inbound access to Aria Operations nodes and related management ports.

Stay Safe. Stay Secure

OP Innovate Research Team

Under Cyber Attack?

Fill out the form and we will contact you immediately.