CISA Adds VMware Aria Operations RCE Flaw to KEV Catalog After Reports of Active Exploitation

CISA Adds VMware Aria Operations RCE Flaw to KEV Catalog After Reports of Active Exploitation

CISA has added CVE-2026-22719 to its Known Exploited Vulnerabilities catalog after reports of active exploitation targeting VMware Aria Operations, the widely deployed enterprise monitoring platform used to track server, network, and cloud infrastructure performance.

The vulnerability, a CVSS 8.1 command injection flaw, allows an unauthenticated attacker to execute arbitrary commands on vulnerable systems — potentially achieving full remote code execution. Federal civilian agencies have been ordered to remediate by March 24, 2026.

Broadcom acknowledged awareness of exploitation reports but stopped short of independent confirmation, stating it "cannot independently confirm their validity." No technical details about the exploitation activity have been publicly disclosed.

The Vulnerability

CVE-2026-22719 is a command injection vulnerability in VMware Aria Operations that can be exploited without authentication during the support-assisted product migration process.

The attack surface stems from the migration service infrastructure — specifically a migration service script and a sudoers entry that allows a workflow script to execute as root without a password:

NOPASSWD: /usr/lib/vmware-casa/bin/vmware-casa-workflow.sh

An attacker who can reach the migration service endpoint can inject arbitrary commands that execute with root privileges through this passwordless sudo chain — a critical exposure on any Aria Operations appliance where migration components remain enabled.

Timeline

  • February 24, 2026 — Broadcom discloses and patches the vulnerability in advisory VMSA-2026-0001
  • March 3, 2026 — CISA adds CVE-2026-22719 to KEV catalog citing exploitation reports
  • March 24, 2026 — Federal remediation deadline

Workaround Available

For organizations unable to patch immediately, Broadcom provides a shell script workaround (aria-ops-rce-workaround.sh) that must be executed as root on each Aria Operations appliance node. The script:

  • Removes the migration service script at /usr/lib/vmware-casa/migration/vmware-casa-migration-service.sh
  • Removes the passwordless sudoers entry for vmware-casa-workflow.sh

This effectively disables the migration components that create the exploitable attack surface.

Defender Recommendations

  • Patch immediately — apply the February 24 security update across all Aria Operations appliances
  • Deploy the workaround if patching is delayed — run aria-ops-rce-workaround.sh as root on every node to disable the vulnerable migration components
  • Audit sudoers configurations — check for any NOPASSWD entries related to VMware CASA workflow scripts that could provide unauthenticated root execution paths
  • Restrict network access to migration endpoints — ensure Aria Operations migration services are not exposed to untrusted networks
  • Hunt for post-exploitation indicators — review command execution logs on Aria Operations appliances for unexpected activity, particularly commands executed through the migration service path
  • Inventory all VMware Aria Operations deployments — ensure no instances have been missed, including development or staging environments

Read more