US Cybersecurity Adds Exploited VMware Aria Operations To KEV Catalog

Published: (March 5, 2026 at 02:00 AM EST)
2 min read
Source: Slashdot

Source: Slashdot

Overview

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability, tracked as CVE‑2026‑22719, to its Known Exploited Vulnerabilities (KEV) catalog. The agency flags the flaw as being exploited in attacks and requires federal civilian agencies to address it by March 24, 2026.

Vulnerability Details

“A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support‑assisted product migration is in progress.”

  • Product affected: VMware Aria Operations – an enterprise monitoring platform for servers, networks, and cloud infrastructure.
  • Impact: Remote code execution (RCE) through unauthenticated command execution.
  • Exploitation status: Reported as actively exploited in the wild, though details on the attackers, exploitation methods, and scale remain undisclosed.

Broadcom, the vendor, acknowledges reports of exploitation but cannot confirm the claims.

Mitigation and Patch

  • Patch release: Broadcom issued security patches on February 24, 2026.
  • Temporary workaround: For environments that cannot apply the patches immediately, Broadcom provides a shell script workaround:
# aria-ops-rce-workaround.sh
# Execute as root on each Aria Operations appliance node

The script, named aria-ops-rce-workaround.sh, must be run as root on each appliance node. The full instructions are available in Broadcom’s knowledge base article: .

References

0 views
Back to Blog

Related posts

Read more »

'Game of Thrones' Movie In the Works

!Movies//a.fsdn.com/sd/topics/movies_64.png Warner Bros. is developing a feature film set in the world of Game of Thrones with writer Beau Willimon known for An...