Protect.Computer
NEWS

CISA adds VMware Aria RCE flaw (CVE-2026-22719) to KEV

· 0 min read · Device safety

What happened

CISA added CVE-2026-22719 (VMware Aria Operations command injection) to the Known Exploited Vulnerabilities (KEV) catalog. The listing indicates active exploitation and gives U.S. federal civilian agencies a remediation deadline of March 24, 2026.

Broadcom says it has seen exploitation reports and has published patches and a workaround for organizations that cannot patch immediately.

Why this matters

  • KEV inclusion is a strong signal that exploitation is happening in the wild.
  • The flaw is unauthenticated and can lead to remote code execution during support-assisted migration workflows.
  • Aria Operations is commonly connected to broader infrastructure telemetry, making it a high-value foothold.

What defenders should do now

  1. Patch immediately using Broadcom/VMware guidance.
  2. If patching is delayed, apply the temporary vendor workaround on all affected appliance nodes.
  3. Restrict management-plane exposure and review any internet-facing Aria components.
  4. Hunt for suspicious command execution and migration-service abuse indicators.
  5. Prioritize this CVE in vulnerability SLAs due to active exploitation status.

Bottom line

Treat CVE-2026-22719 as an active, high-priority risk. If VMware Aria Operations is in your environment, this should be in your immediate patch queue.

Related reading