On March 3, 2026, the U.S. CISA added CVE-2026-22719, a high-severity vulnerability in VMware Aria Operations, to its Known Exploited Vulnerabilities (KEV) catalog. This indicates confirmed, active exploitation of the flaw in the wild. The vulnerability is a command injection issue that can be exploited by an unauthenticated, remote attacker to execute arbitrary commands with root privileges. Although exploitation requires a specific condition—a product migration must be in progress—the lack of authentication and high potential impact make it a significant threat. Broadcom, VMware's parent company, has released patches and a workaround, and administrators are strongly urged to take immediate action.
CVE-2026-22719 is a command injection vulnerability with a CVSS v3 score of 8.1. It exists in the logic that handles product migrations. An unauthenticated attacker on the same network segment as the target appliance can send a malicious request that injects and executes arbitrary commands. A successful exploit grants the attacker root-level access to the Aria Operations appliance.
A key prerequisite for exploitation is that a support-assisted product migration must be underway. While this narrows the window of opportunity, the fact that it is being exploited in the wild suggests attackers have found ways to either trigger this condition or identify targets already in this state.
The vulnerability affects the following products:
Broadcom first disclosed the vulnerability on February 24, 2026. On March 3, CISA added it to the KEV catalog, providing official confirmation of active, in-the-wild exploitation. Details of the attacks are not public, but the KEV listing obligates U.S. federal agencies to patch the flaw by a specific deadline and serves as a strong warning to all organizations.
Compromising a VMware Aria Operations appliance provides an attacker with a powerful foothold inside a victim's network. Aria Operations is deeply integrated with the vSphere environment, giving it visibility and control over the entire virtual infrastructure. An attacker with root access to this appliance could potentially:
To hunt for potential exploitation, security teams should focus on:
| Type | Value | Description |
|---|---|---|
log_source |
Aria Operations appliance logs |
Monitor for logs related to migration activities that coincide with anomalous command execution or network connections. |
process_name |
bash, sh, curl, wget |
Look for unexpected shell processes or network utility tools being executed by the Aria Operations service account. |
network_traffic_pattern |
Unusual outbound traffic from Aria appliance |
Monitor for connections to unknown or malicious IP addresses, which could indicate C2 communication or data exfiltration. |
Process Analysis (D3-PA).M1051 - Update Software.M1035 - Limit Access to Resource Over Network.The primary mitigation is to apply the security updates provided by Broadcom/VMware.
Mapped D3FEND Techniques:
Restrict network access to the VMware Aria Operations appliance from untrusted networks to reduce the attack surface.
Mapped D3FEND Techniques:
Given that CVE-2026-22719 is confirmed to be actively exploited, the most urgent and effective defensive action is to apply the software updates provided by Broadcom. Organizations should immediately identify all instances of VMware Aria Operations, VMware Cloud Foundation, and VMware vSphere Foundation in their environments and upgrade them to the patched versions (e.g., Aria Operations 8.18.6+). Due to the KEV status, this should be treated as an emergency change. For organizations unable to patch immediately, applying the official workaround script from VMware is a critical compensating control, but should be considered a temporary measure until the full update can be deployed. This action directly closes the vulnerability, preventing attackers from using this specific vector for command injection.
To detect potential exploitation of CVE-2026-22719 or similar command injection flaws, security teams should implement robust process analysis on their VMware Aria Operations appliances. This involves establishing a baseline of normal running processes and their parent-child relationships. An EDR agent or a host-based intrusion detection system (HIDS) should be configured to monitor for anomalous process creation events. Specifically, look for the main Aria Operations service process spawning unexpected shells like sh, bash, or command-line utilities such as curl, wget, nc. Since the exploit grants root privileges, any such activity from the service's user context is highly suspicious. Correlating these process events with network logs showing unusual outbound connections from the appliance can provide high-fidelity alerts indicative of a successful compromise.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats