Broadcom Patches VMware Aria Operations RCE Vulnerabilities in VMSA-2026-0001


Broadcom released VMSA-2026-0001 on February 24, 2026 addressing three VMware Aria Operations vulnerabilities. CVE-2026-22719 enables unauthenticated RCE during migrations with CVSS 8.1 score. Patches available immediately for Aria Operations 8.x and Cloud Foundation bundles.

VMware Aria Operations analytics platform powers Cloud Foundation, Telco Cloud deployments. CVE-2026-22719 command injection hits support-assisted migrations. Attackers execute arbitrary code without authentication during upgrade processes.

CVE-2026-22720 stored XSS flaw lets privileged users inject scripts via custom benchmarks. Administrative actions trigger via malicious content. CVE-2026-22721 privilege escalation grants vCenter users full Aria Operations admin access.

All vulnerabilities rated Important severity by Broadcom. No known exploits in wild reported at disclosure. Affected versions span multiple enterprise bundles requiring urgent verification.

Deutsche Telekom Security researcher Tobias Anders discovered CVE-2026-22719. ERNW researchers Sven Nobis and Lorin Lehawany reported remaining flaws. Credits published in official advisory.

Patching roadmap prioritizes migration-impacted environments first. Workaround exists solely for command injection via KB430349 configuration.

Vulnerability Details Table

CVE IDCVSS ScoreTypeRequirementsImpact
CVE-2026-227198.1Command InjectionUnauthenticated, migration activeRCE
CVE-2026-227208.0Stored XSSPrivileged userAdmin actions
CVE-2026-227216.2Privilege EscalationvCenter accessAdmin rights

Affected Products Matrix

ProductComponentVersionsFixed VersionWorkaround
Cloud FoundationAria Operations9.x9.0.2.0KB430349
Aria OperationsStandalone8.x8.18.6KB430349
Cloud FoundationAria Operations5.x, 4.xKB92148KB430349
Telco Cloud PlatformAria Operations5.x, 4.xKB428241KB430349
Telco Cloud InfrastructureAria Operations3.x, 2.xKB428241KB430349

KB430349 disables vulnerable migration endpoints temporarily. Full patches restore functionality with hardened validation.

Patch Deployment Steps

  • Verify Aria Operations version against matrix
  • Download corresponding bundle from Broadcom portal
  • Apply KB430349 immediately if patching delayed
  • Test migrations post-upgrade
  • Audit custom benchmark configurations
  • Monitor vCenter user permissions

Enterprise telco deployments face highest exposure during planned upgrades. RCE chain potential exists across flaws. Broadcom recommends staging patches before migration windows.

No evidence of active exploitation campaigns detected. Rapid disclosure follows responsible researcher coordination.

FAQ

Which VMware product faces RCE risk?

Aria Operations during support-assisted migrations via CVE-2026-22719.

CVSS scores for disclosed flaws?

8.1 command injection, 8.0 stored XSS, 6.2 privilege escalation.

Workarounds available for all issues?

Only CVE-2026-22719 via KB430349 endpoint disablement.

Who discovered the vulnerabilities?

Tobias Anders (Deutsche Telekom), Sven Nobis, Lorin Lehawany (ERNW).

Fixed versions for Cloud Foundation 9.x?

9.0.2.0 bundle addresses all three CVEs.

Migration impact post-patching?

Full functionality restored with command validation hardening.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages