TROYANOSYVIRUS
Voltar para CVEs

CVE-2026-22719

HIGHCISA KEV
8.1

Descricao

VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001

Detalhes CVE

Pontuacao CVSS v3.18.1
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Vetor de ataqueNETWORK
ComplexidadeHIGH
Privilegios necessariosNONE
Interacao do usuarioNONE
Publicado2/25/2026
Ultima modificacao3/4/2026
Fontekev
Avistamentos honeypot0

CISA KEV

FornecedorBroadcom
ProdutoVMware Aria Operations
Nome da vulnerabilidadeBroadcom VMware Aria Operations Command Injection Vulnerability
Data inclusao KEV2026-03-03
Prazo de remediacao2026-03-24
Uso em ransomwareUnknown

Produtos afetados

vmware:aria_operationsvmware:cloud_foundationvmware:telco_cloud_infrastructurevmware:telco_cloud_platform

Fraquezas (CWE)

CWE-77

Correlacoes IOC

Sem correlacoes registradas

This product uses data from the NVD API but is not endorsed or certified by the NVD.