Broadcom Addresses Critical Vulnerabilities in VMware Aria Operations
Broadcom has issued updates to resolve multiple significant vulnerabilities in VMware Aria Operations, a platform designed for managing IT operations in virtual and hybrid environments. The vulnerabilities allow attackers to exploit elements of the system, potentially compromising infrastructure efficiency and security.
CVE-2026-22719 is a command injection vulnerability rated 8.1 on the CVSS scale, enabling remote code execution by unauthenticated attackers during specific support-assisted product migration processes. CVE-2026-22720 involves a stored cross-site scripting (XSS) vulnerability with a CVSS score of 8.0, permitting attackers with certain privileges to execute malicious scripts in user browsers. This can facilitate unauthorized administrative actions. Another vulnerability, CVE-2026-22721, scores 6.2 and relates to privilege escalation, which could allow attackers to gain administrative-level access within affected environments.
These vulnerabilities affect various VMware products, including VMware Aria Operations 8.x and VMware Cloud Foundation among others. Broadcom advises organizations to upgrade to the specified fixed versions which include VMware Aria Operations 8.18.6 and VMware Cloud Foundation 9.0.2.0. For environments unable to apply immediate patches, alternative mitigation strategies are outlined in the advisory.
Defensive Context
Organizations relying on VMware Aria Operations for IT management should prioritize addressing these vulnerabilities to avoid unauthorized access. Those using older versions of the affected products or currently engaged in support-assisted migrations are particularly at risk. Affected entities must assess their exposure and take appropriate action based on their operational dependencies on the VMware suite.
Why This Matters
The risk level presented by these vulnerabilities is substantial, as they can lead to significant security breaches if not addressed. Organizations leveraging VMware for cloud and hybrid operations must act swiftly to minimize the potential impact of exploitation, which could result in unauthorized access and data compromise.
Defender Considerations
Immediate action is necessary to upgrade to the resolved versions of VMware products. Specifically, organizations should focus on the mentioned vulnerabilities and ensure systems are updated accordingly. The use of mitigation strategies in the advisory could also alleviate some risks while permanent fixes are being implemented.
Indicators of Compromise (IOCs)
The specific vulnerabilities are identified as CVE-2026-22719, CVE-2026-22720, and CVE-2026-22721. Organizations should monitor for any exploitation attempts related to these vulnerabilities, particularly during product migration activities or situations where custom benchmarks are involved.



