CISA Adds Actively Exploited VMware Aria Operations Flaw CVE-2026-22719 to KEV Catalog
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,理解其主要内容。 文章讲的是美国网络安全和基础设施安全局(CISA)将Broadcom VMware Aria Operations的一个安全漏洞加入到已知被利用的漏洞目录中。这个漏洞编号是CVE-2026-22719,CVSS评分为8.1,属于高危漏洞。它允许未经身份验证的攻击者执行任意命令,可能导致远程代码执行。 此外,文章还提到了另外两个漏洞CVE-2026-22720和CVE-2026-22721,分别涉及存储型跨站脚本和权限提升。受影响的产品包括VMware Cloud Foundation、vSphere Foundation 9.x.x.x和VMware Aria Operations 8.x,已经发布了修复版本。 对于无法立即应用补丁的用户,可以使用一个shell脚本来作为临时解决方案。目前还没有关于该漏洞在野利用的具体细节、幕后黑手以及影响范围的信息。Broadcom表示他们 aware of reports but cannot confirm their validity. 最后,FCEB机构被要求在2026年3月24日前应用修复补丁。 总结时要抓住关键点:CISA添加了高危漏洞到KEV目录,影响Broadcom VMware产品,允许远程代码执行,并提供了修复版本和临时解决方案。同时提到政府机构的截止日期。 现在我要把这些信息浓缩到100字以内,确保涵盖主要信息:CISA添加漏洞、影响产品、风险等级、攻击方式、修复措施和政府要求。 </think> 美国网络安全机构将Broadcom VMware Aria Operations的高危漏洞CVE-2026-22719加入已知被利用漏洞目录,该漏洞允许未认证攻击者执行任意命令并引发远程代码执行。受影响产品包括VMware Cloud Foundation、vSphere Foundation 9.x.x.x和Aria Operations 8.x,并已发布修复版本。无法立即更新的用户可使用临时脚本缓解风险。政府机构需在3月24日前完成修复。 2026-3-4 04:35:0 Author: thehackernews.com(查看原文) 阅读量:15 收藏

Vulnerability / Enterprise Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a recently disclosed security flaw impacting Broadcom VMware Aria Operations to its Known Exploited Vulnerabilities (KEV) catalog, citing active exploitation in the wild.

The high-severity vulnerability, CVE-2026-22719 (CVSS score: 8.1), has been described as a case of command injection that could allow an unauthenticated attacker to execute arbitrary commands.

"A malicious unauthenticated actor may exploit this issue to execute arbitrary commands, which may lead to remote code execution in VMware Aria Operations while support-assisted product migration is in progress," the company said in an advisory released late last month.

The shortcoming was addressed, along withCVE-2026-22720, a stored cross-site scripting vulnerability, and CVE-2026-22721, a privilege escalation vulnerability that could result in administrative access. It impacts the following products -

  • VMware Cloud Foundation and VMware vSphere Foundation 9.x.x.x - Fixed in 9.0.2.0
  • VMware Aria Operations 8.x - Fixed in 8.18.6

Customers who cannot apply the patch immediately can download and run a shell script ("aria-ops-rce-workaround.sh") as root from each Aria Operations Virtual Appliance node.

There are currently no details on how the vulnerability is being exploited in the wild, who is behind it, and the scale of such efforts.

"Broadcom is aware of reports of potential exploitation of CVE-2026-22719 in the wild, but we cannot independently confirm their validity," the company noted in an update to its bulletin.

In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are required to apply the fixes by March 24, 2026.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/03/cisa-adds-actively-exploited-vmware.html
如有侵权请联系:admin#unsafe.sh