Latest
Vulnerabilities

VMware Patches Command Injection Vulnerability in Aria Operations

VMware Patches Command Injection Vulnerability in Aria Operations

VMware has issued patches addressing several high- and medium-risk vulnerabilities in its Aria Operations, Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure products.

The most critical vulnerability allows unauthenticated attackers to execute arbitrary commands on the underlying operating system. Another significant issue permits authenticated users to elevate their privileges to that of an administrator.

The vulnerabilities, identified as CVE-2026-22719, CVE-2026-22720, and CVE-2026-22721, were reported to Broadcom privately. Currently, there is no evidence suggesting that these vulnerabilities have been exploited in the wild. However, it is worth noting that similar critical vulnerabilities in Aria Operations have been exploited previously, and enterprise virtualization infrastructure has been a target for state-sponsored threat actors.

Recommendations for Users

Broadcom recommends that customers upgrade to Aria Operations version 8.18.6 and VMware Cloud Foundation versions 5.2.3 or 9.0.2. The VMware Telco Cloud Platform and Telco Cloud Infrastructure are also affected, as they incorporate Aria Operations, which is essential for managing private and multicloud environments.

Details on Vulnerabilities

Command Injection and Privilege Escalation

CVE-2026-22719 is an unauthenticated command injection flaw potentially leading to remote code execution. Despite its severity, it has been rated high rather than critical because exploitation is only possible during support-assisted product migrations, reducing the likelihood of widespread attacks.

In comparison, a similar command injection flaw disclosed in 2023 for Aria Operations for Networks saw nearly 700,000 attempted attacks by security companies.

Cross-Site Scripting and Privilege Escalation

The second vulnerability, CVE-2026-22720, is characterized as a stored cross-site scripting (XSS) issue, rated high severity with a CVSS score of 8.0. This flaw allows privileged attackers to inject persistent scripts that can perform administrative actions by creating custom benchmarks on a deployment.

The third vulnerability is of moderate severity, rated 6.2, and could be exploited if attackers gain privileges in vCenter, allowing them access to Aria Operations. vCenter serves as the management platform for vSphere virtual environments, and this vulnerability could potentially lead to administrative privileges within Aria.

More in Vulnerabilities & Patches

30-Year-Old Vulnerability Discovered in libpng Library
Vulnerabilities

30-Year-Old Vulnerability Discovered in libpng Library

Apr 16, 2026 3 min read
Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws
Vulnerabilities

Microsoft Addresses Exploited SharePoint Vulnerability and Fixes 160 Additional Security Flaws

Apr 16, 2026 2 min read
10 Persistent Software Bugs That Took Ages to Fix
Vulnerabilities

10 Persistent Software Bugs That Took Ages to Fix

Apr 15, 2026 9 min read
Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers
Vulnerabilities

Vulnerability may allow hackers to seize control of Juniper Networks PTX core routers

Apr 14, 2026 3 min read