CISA Adds Actively Exploited VMware Aria Operations
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a VMware Aria Operations vulnerability tracked as CVE-2026-22719 to its Known Exploited Vulnerabilities catalog, flagging the
What Happened
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability in VMware Aria Operations, tracked as CVE-2026-22719, to its Known Exploited Vulnerabilities (KEV) catalog. This action confirms that the flaw is being actively exploited by threat actors in the wild. The vulnerability, which affects a product now under Broadcom’s portfolio following its acquisition of VMware, is a remote code execution (RCE) flaw. CISA’s binding operational directive requires all federal civilian agencies to patch the vulnerability by a specified deadline, underscoring the severity of the active attacks.
Why It Matters
The addition to the KEV catalog serves as a critical, authoritative alert for all organizations, not just federal agencies. VMware Aria Operations is an enterprise-level suite for managing and automating IT environments, making it a high-value target. Its compromise can provide attackers with deep access to an organization’s virtualized infrastructure, leading to data theft, lateral movement, and operational disruption. For security teams, this CISA directive is a clear signal to prioritize patching over other vulnerabilities, as exploitation is no longer theoretical but confirmed. Delay increases the likelihood of a breach.
Technical Details
CVE-2026-22719 is a critical remote code execution vulnerability. While specific technical details are often withheld upon initial KEV listing to prevent further weaponization, the flaw likely exists within the web interface or API of VMware Aria Operations. Exploitation typically requires network access to the management interface and could allow an unauthenticated attacker to execute arbitrary commands on the underlying host system. The affected versions are VMware Aria Operations for Networks (formerly vRealize Network Insight) and VMware Aria Operations for Logs. Successful exploitation grants control over the management platform.
Immediate Risk
The immediate risk is high for organizations with unpatched, internet-facing VMware Aria Operations instances. CISA’s confirmation of active exploitation means attack scripts or methodologies are in use by threat actors, potentially including ransomware groups or state-sponsored actors. The risk extends beyond direct compromise of the Aria system; it serves as a potent initial access vector into the broader virtual environment. Organizations must treat this as an urgent patching event. The window between vulnerability disclosure and widespread exploitation has effectively closed.
Security Insight
This event reinforces the critical need for rapid vulnerability management, especially for internet-facing management systems. Security teams should immediately inventory all deployments of VMware Aria Operations, isolate them from the internet if possible, and apply the relevant patches from Broadcom without delay. For systems that cannot be patched immediately, implementing strict network segmentation and access controls is a mandatory compensating control. Furthermore, monitoring network traffic to these systems for anomalous outbound connections or unexpected process execution is essential for detecting potential compromise.
Never miss a security update
Get real-time security alerts delivered to your preferred platform.
Related News
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added three security flaws to its Known Exploited Vulnerabilities (KEV) catalog, based on evidence of active exploitation. Th
Ivanti warned customers today to patch a high-severity remote code execution vulnerability in Endpoint Manager Mobile (EPMM) exploited in zero-day attacks. [...]
Palo Alto Networks warned customers today that a critical-severity unpatched vulnerability in the PAN-OS User-ID Authentication Portal is being exploited in attacks. [...]