Search criteria

2 vulnerabilities found for Cloud Foundationcust by VMware

CVE-2026-22719 (GCVE-0-2026-22719)

Vulnerability from nvd – Published: 2026-02-25 19:18 – Updated: 2026-02-25 19:18
VLAI?
Title
VMware Aria Operations command injection vulnerability
Summary
VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001
Assigner
Impacted products
Vendor Product Version
VMware Aria Operations Affected: 8.18.0 , < 8.18.6 (custom)
Unaffected: 8.18.6
Create a notification for this product.
    VMware Cloud Foundationcust Affected: 9.0 , < 9.0.2 (custom)
Unaffected: 9.0.2 (custom)
Affected: 4.0 , < 5.2.3 (custom)
Unaffected: 5.2.3
Create a notification for this product.
    VMware Telco Cloud Platform Affected: 2.0 , < 5.2.3 (custom)
Unaffected: 5.2.3 (custom)
Create a notification for this product.
    VMware Telco Cloud Infrastructure Affected: 2.0 , < 5.2.3 (custom)
Unaffected: 5.2.3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "vmware-aria-operations",
          "product": "Aria Operations",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.18.6",
              "status": "affected",
              "version": "8.18.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "8.18.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "vmware-cloud-foundation-operations",
          "product": "Cloud Foundationcust",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "9.0.2",
              "status": "affected",
              "version": "9.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "9.0.2",
              "versionType": "custom"
            },
            {
              "lessThan": "5.2.3",
              "status": "affected",
              "version": "4.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "5.2.3"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "vmware-telco-cloud-platform",
          "product": "Telco Cloud Platform",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "5.2.3",
              "status": "affected",
              "version": "2.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "5.2.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "vmware-telco-cloud-infrastructure",
          "product": "Telco Cloud Infrastructure",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "5.2.3",
              "status": "affected",
              "version": "2.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "5.2.3"
            }
          ]
        }
      ],
      "datePublic": "2026-02-24T06:24:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eVMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.\u0026nbsp;\u003c/p\u003e\u003cp\u003eTo remediate CVE-2026-22719, apply the patches listed in the \u0027Fixed Version\u0027 column of the \u0027\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947\"\u003eResponse Matrix\u003c/a\u003e\u0027 in VMSA-2026-0001\u0026nbsp;\u003c/p\u003e\u003cp\u003eWorkarounds for CVE-2026-22719 are documented in the \u0027Workarounds\u0027 column of the \u0027\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947\"\u003eResponse Matrix\u003c/a\u003e\u0027 in VMSA-2026-0001\u003c/p\u003e"
            }
          ],
          "value": "VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.\u00a0\n\nTo remediate CVE-2026-22719, apply the patches listed in the \u0027Fixed Version\u0027 column of the \u0027 Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 \u0027 in VMSA-2026-0001\u00a0\n\nWorkarounds for CVE-2026-22719 are documented in the \u0027Workarounds\u0027 column of the \u0027 Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 \u0027 in VMSA-2026-0001"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-25T19:18:59.269Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "name": "VMSA-2026-0001: VMware Aria Operations updates (includes CVE-2026-22719)",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
        },
        {
          "name": "KB430349: Workaround instructions for CVE-2026-22719",
          "tags": [
            "mitigation"
          ],
          "url": "https://knowledge.broadcom.com/external/article/430349"
        },
        {
          "name": "VMware Aria Operations 8.18.6 Release Notes (resolves CVE-2026-22719)",
          "tags": [
            "release-notes"
          ],
          "url": "https://techdocs.broadcom.com/us/en/vmware-cis/aria/aria-operations/8-18/vmware-aria-operations-8186-release-notes.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eApply the vendor patches listed in the \u0027Fixed Version\u0027 column of the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947\"\u003eResponse Matrix\u003c/a\u003e\u0026nbsp;in VMSA-2026-0001.\u0026nbsp;Fixed versions include VMware Aria Operations 8.18.6 (for 8.x) and VMware Cloud Foundation Operations 9.0.2.0 (for 9.x).\u003c/p\u003e"
            }
          ],
          "value": "Apply the vendor patches listed in the \u0027Fixed Version\u0027 column of the  Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 \u00a0in VMSA-2026-0001.\u00a0Fixed versions include VMware Aria Operations 8.18.6 (for 8.x) and VMware Cloud Foundation Operations 9.0.2.0 (for 9.x)."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware Aria Operations command injection vulnerability",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eWorkarounds are available and documented by the vendor (see\u0026nbsp; VMSA-2026-0001\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://knowledge.broadcom.com/external/article/430349\"\u003eKB430349)\u003c/a\u003e for environments where immediate patching is not possible.\u003c/p\u003e"
            }
          ],
          "value": "Workarounds are available and documented by the vendor (see\u00a0 VMSA-2026-0001\u00a0 KB430349) https://knowledge.broadcom.com/external/article/430349  for environments where immediate patching is not possible."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2026-22719",
    "datePublished": "2026-02-25T19:18:59.269Z",
    "dateReserved": "2026-01-09T06:54:36.841Z",
    "dateUpdated": "2026-02-25T19:18:59.269Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}

CVE-2026-22719 (GCVE-0-2026-22719)

Vulnerability from cvelistv5 – Published: 2026-02-25 19:18 – Updated: 2026-02-25 19:18
VLAI?
Title
VMware Aria Operations command injection vulnerability
Summary
VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.  To remediate CVE-2026-22719, apply the patches listed in the 'Fixed Version' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001  Workarounds for CVE-2026-22719 are documented in the 'Workarounds' column of the ' Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 ' in VMSA-2026-0001
Assigner
Impacted products
Vendor Product Version
VMware Aria Operations Affected: 8.18.0 , < 8.18.6 (custom)
Unaffected: 8.18.6
Create a notification for this product.
    VMware Cloud Foundationcust Affected: 9.0 , < 9.0.2 (custom)
Unaffected: 9.0.2 (custom)
Affected: 4.0 , < 5.2.3 (custom)
Unaffected: 5.2.3
Create a notification for this product.
    VMware Telco Cloud Platform Affected: 2.0 , < 5.2.3 (custom)
Unaffected: 5.2.3 (custom)
Create a notification for this product.
    VMware Telco Cloud Infrastructure Affected: 2.0 , < 5.2.3 (custom)
Unaffected: 5.2.3
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "vmware-aria-operations",
          "product": "Aria Operations",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.18.6",
              "status": "affected",
              "version": "8.18.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "8.18.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "vmware-cloud-foundation-operations",
          "product": "Cloud Foundationcust",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "9.0.2",
              "status": "affected",
              "version": "9.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "9.0.2",
              "versionType": "custom"
            },
            {
              "lessThan": "5.2.3",
              "status": "affected",
              "version": "4.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "5.2.3"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "vmware-telco-cloud-platform",
          "product": "Telco Cloud Platform",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "5.2.3",
              "status": "affected",
              "version": "2.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "5.2.3",
              "versionType": "custom"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "vmware-telco-cloud-infrastructure",
          "product": "Telco Cloud Infrastructure",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "5.2.3",
              "status": "affected",
              "version": "2.0",
              "versionType": "custom"
            },
            {
              "status": "unaffected",
              "version": "5.2.3"
            }
          ]
        }
      ],
      "datePublic": "2026-02-24T06:24:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eVMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.\u0026nbsp;\u003c/p\u003e\u003cp\u003eTo remediate CVE-2026-22719, apply the patches listed in the \u0027Fixed Version\u0027 column of the \u0027\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947\"\u003eResponse Matrix\u003c/a\u003e\u0027 in VMSA-2026-0001\u0026nbsp;\u003c/p\u003e\u003cp\u003eWorkarounds for CVE-2026-22719 are documented in the \u0027Workarounds\u0027 column of the \u0027\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947\"\u003eResponse Matrix\u003c/a\u003e\u0027 in VMSA-2026-0001\u003c/p\u003e"
            }
          ],
          "value": "VMware Aria Operations contains a command injection vulnerability. A malicious unauthenticated actor may exploit this issue to execute arbitrary commands which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress.\u00a0\n\nTo remediate CVE-2026-22719, apply the patches listed in the \u0027Fixed Version\u0027 column of the \u0027 Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 \u0027 in VMSA-2026-0001\u00a0\n\nWorkarounds for CVE-2026-22719 are documented in the \u0027Workarounds\u0027 column of the \u0027 Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 \u0027 in VMSA-2026-0001"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2026-02-25T19:18:59.269Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "name": "VMSA-2026-0001: VMware Aria Operations updates (includes CVE-2026-22719)",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947"
        },
        {
          "name": "KB430349: Workaround instructions for CVE-2026-22719",
          "tags": [
            "mitigation"
          ],
          "url": "https://knowledge.broadcom.com/external/article/430349"
        },
        {
          "name": "VMware Aria Operations 8.18.6 Release Notes (resolves CVE-2026-22719)",
          "tags": [
            "release-notes"
          ],
          "url": "https://techdocs.broadcom.com/us/en/vmware-cis/aria/aria-operations/8-18/vmware-aria-operations-8186-release-notes.html"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eApply the vendor patches listed in the \u0027Fixed Version\u0027 column of the \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947\"\u003eResponse Matrix\u003c/a\u003e\u0026nbsp;in VMSA-2026-0001.\u0026nbsp;Fixed versions include VMware Aria Operations 8.18.6 (for 8.x) and VMware Cloud Foundation Operations 9.0.2.0 (for 9.x).\u003c/p\u003e"
            }
          ],
          "value": "Apply the vendor patches listed in the \u0027Fixed Version\u0027 column of the  Response Matrix https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947 \u00a0in VMSA-2026-0001.\u00a0Fixed versions include VMware Aria Operations 8.18.6 (for 8.x) and VMware Cloud Foundation Operations 9.0.2.0 (for 9.x)."
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware Aria Operations command injection vulnerability",
      "workarounds": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cp\u003eWorkarounds are available and documented by the vendor (see\u0026nbsp; VMSA-2026-0001\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://knowledge.broadcom.com/external/article/430349\"\u003eKB430349)\u003c/a\u003e for environments where immediate patching is not possible.\u003c/p\u003e"
            }
          ],
          "value": "Workarounds are available and documented by the vendor (see\u00a0 VMSA-2026-0001\u00a0 KB430349) https://knowledge.broadcom.com/external/article/430349  for environments where immediate patching is not possible."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2026-22719",
    "datePublished": "2026-02-25T19:18:59.269Z",
    "dateReserved": "2026-01-09T06:54:36.841Z",
    "dateUpdated": "2026-02-25T19:18:59.269Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}