Wednesday, March 4, 2026
HomeTechnologyCISA flags VMware Aria Operations RCE flaw as exploited in assaults

CISA flags VMware Aria Operations RCE flaw as exploited in assaults

CISA flags VMware Aria Operations RCE flaw as exploited in assaults

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Identified Exploited Vulnerabilities catalog, flagging the flaw as exploited in assaults.

Broadcom additionally warned that it’s conscious of experiences indicating the vulnerability is exploited however says it can not independently verify the claims.

VMware Aria Operations is an enterprise monitoring platform that helps organizations monitor the efficiency and well being of servers, networks, and cloud infrastructure.

The vulnerability was initially disclosed and patched on February 24, 2026, as a part of VMware’s VMSA-2026-0001 advisory, which was rated Essential with a CVSS rating of 8.1.

The flaw has now been added to the CISA’s Identified Exploited Vulnerabilities (KEV) catalog, with the US cyber company requiring federal civilian businesses to deal with the difficulty by March 24, 2026.

In a latest replace to the advisory, Broadcom mentioned it’s conscious of experiences indicating the vulnerability is exploited in assaults however can not verify the claims.

“Broadcom is conscious of experiences of potential exploitation of CVE-2026-22719 within the wild, however we can not independently verify their validity,” states the up to date advisory.

Presently, no technical particulars about how the flaw could also be exploited have been publicly disclosed.

BleepingComputer contacted Broadcom with questions concerning the reported exercise, however has not acquired a response.

The command injection flaw

In keeping with Broadcom, CVE-2026-22719 is a command injection vulnerability that enables an unauthenticated attacker to execute arbitrary instructions on weak methods.

“A malicious unauthenticated actor might exploit this difficulty to execute arbitrary instructions which can result in distant code execution in VMware Aria Operations whereas support-assisted product migration is in progress,” the advisory explains.

Broadcom launched safety patches on February 24 and in addition supplied a short-term workaround for organizations unable to use the patches instantly.

The mitigation is a shell script named “aria-ops-rce-workaround.sh,” which have to be executed as root on every Aria Operations equipment node.

The script disables elements of the migration course of that could possibly be abused throughout exploitation, together with eradicating the “/usr/lib/vmware-casa/migration/vmware-casa-migration-service.sh” and the next sudoers entry that enables vmware-casa-workflow.sh to run as root with out a password:


NOPASSWD: /usr/lib/vmware-casa/bin/vmware-casa-workflow.sh

Admins are suggested to use obtainable VMware Aria Operations safety patches or implement workarounds as quickly as doable, particularly if the flaw is being actively exploited in assaults.

Malware is getting smarter. The Pink Report 2026 reveals how new threats use math to detect sandboxes and conceal in plain sight.

Obtain our evaluation of 1.1 million malicious samples to uncover the highest 10 methods and see in case your safety stack is blinded.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Most Popular

Recent Comments