

Affected Environment
Enterprises running VMware Aria Operations 8.x and bundled versions in Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure.
Threat Overview
Three important‑severity flaws in Aria Operations enable remote code execution, script injection, and escalation to administrative access.
Exposure Timeline
Vulnerabilities disclosed and fixes issued on 24 Feb 2026. All listed Aria Operations versions before the fixed releases remain exposed.
Attack Surface
Risk affects Aria Operations components within on‑premises VMware environments, including those embedded in Cloud and Telco platforms.
Technical Root Cause
Flaws include command injection during support‑assisted migration, stored cross‑site scripting, and a privilege escalation path via vCenter.
Exploitation Pathway
An attacker could run commands during migration, inject scripts via custom benchmarks, or turn vCenter access into Aria admin privileges.
Operational Impact
Successful exploitation could give attackers admin control, enable unauthorized changes, disrupt services, or compromise monitored systems.
Strategic Impact
The incident highlights control‑plane risk in monitoring platforms and the need for tighter privilege design and timely patching of VMware stacks.
Required Mitigation
Upgrade Aria Operations and Cloud Foundation components to fixed versions. Enforce least privilege and update security products and controls.
Incident Response Guidance
If compromise is suspected, isolate affected Aria nodes, review admin changes and vCenter access, investigate for script and RCE activity, then remediate.
References
Broadcom / VMware support advisory (Support Content Notification – Support Portal). CVE-2026-22719, CVE-2026-22720, CVE-2026-22721.
Trusted by clients worldwide






Led by human expertise and powered by the VisionX platform, we provide you with a 24/7 unbeatable Managed Detection & Response capability giving you transparent and consolidated security solutions.




