CVEReports
CVEReports

Automated vulnerability intelligence platform. Comprehensive reports for high-severity CVEs generated by AI.

Product

  • Home
  • Sitemap
  • RSS Feed

Company

  • About
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CVEReports. All rights reserved.

Made with love by Amit Schendel & Alon Barad



CVE-2026-22719
8.110.76%

CVE-2026-22719: Unauthenticated Command Injection in VMware Aria Operations

Alon Barad
Alon Barad
Software Engineer

Mar 5, 2026·4 min read·9 visits

Active ExploitationCISA KEV Listed

Executive Summary (TL;DR)

Unauthenticated Remote Code Execution (RCE) in VMware Aria Operations via the migration service. Rated CVSS 8.1 (High) due to high attack complexity (requires active migration state). Actively exploited in the wild.

A high-severity command injection vulnerability exists in the support-assisted product migration interface of VMware Aria Operations (formerly vRealize Operations). The flaw allows unauthenticated remote attackers to execute arbitrary commands with administrative privileges, provided the target system is actively undergoing a support-assisted migration. This vulnerability has been identified in active exploitation campaigns and added to the CISA Known Exploited Vulnerabilities (KEV) catalog.

Vulnerability Overview

CVE-2026-22719 is a Command Injection vulnerability (CWE-77) affecting the 'support-assisted product migration' feature in VMware Aria Operations. This feature is designed to facilitate the transfer of data and configuration settings during product upgrades or support interventions. The vulnerability manifests in the way the application processes external input received over the network during this specific operational state.

The flaw permits an unauthenticated attacker to inject arbitrary operating system commands into the affected component. Because the Aria Operations appliance typically runs with elevated privileges (often root or a highly privileged service account) to manage virtualization infrastructure, successful exploitation results in complete system compromise. The vulnerability affects multiple versions of the 8.x and 9.x branches, as well as associated Cloud Foundation and Telco Cloud products.

Technical Analysis & Root Cause

The core defect lies in the improper neutralization of special elements used in a command (CWE-77). When the support-assisted migration service is active, it exposes specific API endpoints or listeners to coordinate the migration process. These endpoints accept parameters—likely intended for file paths, IP addresses, or configuration tokens—that are subsequently used to construct a command-line string for execution by the underlying operating system shell.

The application fails to rigorously sanitize this input before passing it to functions such as system(), exec(), or equivalent shell-execution primitives. An attacker can append shell metacharacters (e.g., ;, |, &, $()) to the legitimate input. When the application processes this tainted string, the shell interprets the metacharacters as command separators or sub-shell directives, executing the attacker's payload alongside the intended migration command.

> [!NOTE] > The 'High' Attack Complexity (AC:H) rating in the CVSS score (8.1) is critical context. The vulnerable code path is not universally accessible; it requires the target system to be in a specific state: 'support-assisted product migration' must be in progress. This creates a temporal restriction on exploitation, limiting the attack window to times when administrators are actively maintaining or upgrading the system.

Exploitation Methodology

To exploit this vulnerability, an attacker must first identify a VMware Aria Operations instance that has the migration service active. In a typical attack scenario, the adversary would scan for the specific ports or HTTP endpoints associated with the migration tool. Once the service is detected, the attacker constructs a malicious network request containing the command injection payload.

Given the lack of authentication requirements (PR:N), the attacker does not need valid credentials. The payload is delivered via the network (AV:N). Successful injection allows the attacker to spawn a reverse shell, download remote malware, or directly exfiltrate credentials stored on the appliance. The following diagram illustrates the attack flow:

The vulnerability is particularly dangerous because it bypasses standard access controls. While the requirement for the migration state to be active acts as a mitigating factor, threat actors often automate the scanning process to detect this state the moment it is engaged.

Impact Assessment

The impact of CVE-2026-22719 is classified as Critical regarding the confidentiality, integrity, and availability of the affected system.

  • Confidentiality: Attackers can access sensitive configuration data, including vCenter credentials, database connection strings, and infrastructure maps. This data can be used to pivot laterally into the managed virtualization environment.
  • Integrity: Attackers can modify system configurations, inject persistent backdoors, or alter monitoring data to hide their presence.
  • Availability: Attackers can delete critical files, stop services, or encrypt the appliance (ransomware), disrupting the organization's ability to monitor and manage their virtual infrastructure.

Since VMware Aria Operations often serves as a centralized management hub, its compromise can serve as a beachhead for wider attacks against the Software-Defined Data Center (SDDC).

Mitigation and Remediation

Broadcom has released official patches to address this vulnerability. Organizations using VMware Aria Operations should upgrade immediately to the fixed versions:

  • v8.x Branch: Upgrade to version 8.18.6.
  • v9.x Branch: Upgrade to version 9.0.2.
  • Cloud Foundation: Upgrade to 5.2.3 or 9.0.2.0 depending on the branch.

Workaround (KB430349) If immediate patching is not feasible, a workaround script is available. This script likely disables the vulnerable migration vector or enforces stricter input validation at the configuration level.

  1. Download aria-ops-rce-workaround.sh from Broadcom KB430349.
  2. Transfer to the appliance: scp aria-ops-rce-workaround.sh root@<node-ip>:/root/
  3. Execute: chmod +x aria-ops-rce-workaround.sh && ./aria-ops-rce-workaround.sh

Security teams should also implement network detection rules (Snort/Suricata) to flag traffic destined for migration endpoints containing common shell metacharacters.

Official Patches

BroadcomVMSA-2026-0001 Security Advisory
BroadcomKB430349 Workaround Instructions

Technical Appendix

CVSS Score
8.1/ 10
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Probability
10.76%
Top 7% most exploited

Affected Systems

VMware Aria Operations 8.0 - 8.18.5VMware Aria Operations 9.0.0 - 9.0.1VMware Cloud Foundation (Operations) 4.x - 5.2.2VMware Cloud Foundation (Operations) 9.0 - 9.0.1VMware Telco Cloud Platform 4.0 - 5.1VMware Telco Cloud Infrastructure 2.2 - 3.0

Affected Versions Detail

Product
Affected Versions
Fixed Version
VMware Aria Operations
Broadcom
8.0 - 8.18.58.18.6
VMware Aria Operations
Broadcom
9.0.0 - 9.0.19.0.2
AttributeDetail
CVSS v3.18.1 (High)
VectorAV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CWECWE-77 (Command Injection)
EPSS Score10.76%
EPSS Percentile93.20%
KEV StatusListed (Active Exploitation)

MITRE ATT&CK Mapping

T1059Command and Scripting Interpreter
Execution
T1190Exploit Public-Facing Application
Initial Access
T1203Exploitation for Client Execution
Execution
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')

The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.

Vulnerability Timeline

Broadcom releases Security Advisory VMSA-2026-0001
2026-02-24
CVE-2026-22719 published in NVD
2026-02-25
CISA adds to KEV Catalog (Active Exploitation)
2026-03-03
Workaround KB430349 published
2026-03-03

References & Sources

  • [1]NVD Record for CVE-2026-22719
  • [2]CISA KEV Catalog Entry
  • [3]SentinelOne Analysis

Attack Flow Diagram

Press enter or space to select a node. You can then use the arrow keys to move the node around. Press delete to remove it and escape to cancel.
Press enter or space to select an edge. You can then press delete to remove it or escape to cancel.