Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical VMware Aria Flaws Enable Remote Code Attacks

Critical VMware Aria Flaws Enable Remote Code Attacks

Posted on February 24, 2026 By CWS

On February 24, 2026, Broadcom released security advisory VMSA-2026-0001, detailing three significant vulnerabilities in VMware Aria Operations. These flaws, which include risks such as remote code execution, necessitate immediate patching by organizations using the affected technologies to prevent potential threats.

Understanding the Vulnerabilities

VMware Aria Operations is integral to platforms like VMware Cloud Foundation, Telco Cloud Platform, and Telco Cloud Infrastructure. The vulnerabilities identified are command injection (CVE-2026-22719, CVSS 8.1), stored cross-site scripting (CVE-2026-22720, CVSS 8.0), and privilege escalation (CVE-2026-22721, CVSS 6.2). The most severe, CVE-2026-22719, allows attackers without authentication to execute arbitrary commands during support-assisted migrations, potentially leading to full remote code execution.

CVE-2026-22720 poses a risk by enabling privileged users to create custom benchmarks for administrative actions through script injection. Meanwhile, CVE-2026-22721 grants vCenter users the ability to escalate to admin rights in Aria Operations. All three vulnerabilities are rated with Important severity, and patches are now available.

Versions Affected and Solutions

The vulnerabilities impact VMware Aria Operations 8.x and earlier versions within Cloud Foundation 9.x/5.x/4.x, Telco Cloud Platform 5.x/4.x, and Telco Cloud Infrastructure 3.x/2.x. A workaround for CVE-2026-22719 is accessible via KB430349, though no such solutions exist for the other vulnerabilities, highlighting the urgency of applying updates. The patches have been confirmed in releases like Aria Operations 8.18.6 and Cloud Foundation 9.0.2.0.

Administrators are advised to consult the product matrix and apply necessary upgrades without delay to avert potential exploitation during system migrations, which could seriously compromise cloud operations.

Next Steps for IT Administrators

It is crucial for IT administrators to thoroughly review their deployments against the advisory matrix and expedite the application of updates to safeguard their systems. This proactive approach is vital to maintaining secure cloud operations and preventing exploitation by unauthorized actors. The efforts of security researchers Tobias Anders, Sven Nobis, and Lorin Lehawany in identifying these vulnerabilities are acknowledged.

For continuous updates on cybersecurity threats and best practices, stay connected with our channels on Google News, LinkedIn, and X. For collaboration or to share your insights, reach out to us directly.

Cyber Security News Tags:Aria Operations, Broadcom, cloud security, Cybersecurity, Patching, remote code execution, security advisory, Telco Cloud, VMware, Vulnerabilities

Post navigation

Previous Post: Critical Fixes Released for VMware Aria Operations Flaws
Next Post: Arkanix Stealer Malware Ceases Operations Quickly

Related Posts

Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network Hackers Trapped in Resecurity’s Honeypot During Targeted Attack on Employee Network Cyber Security News
Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information Telegram Based Raven Stealer Malware Steals Login Credentials, Payment Data and Autofill Information Cyber Security News
Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More Cybersecurity Newsletter Weekly – Chrome 0-Day, 22.2 Tbps DDOS Attack, Kali Linux Release, Cisco IOS 0-Day and More Cyber Security News
Hackers Actively Scanning for TCP Port 8530/8531 Linked to WSUS Vulnerability CVE-2025-59287 Hackers Actively Scanning for TCP Port 8530/8531 Linked to WSUS Vulnerability CVE-2025-59287 Cyber Security News
Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Salty2FA and Tycoon2FA Phishing Kits Attacking Enterprise Users to Steal Login Credentials Cyber Security News
Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach
  • Timothy Youngblood’s Journey: From CISO to Angel Investor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • UAC-0050 Expands to European Finance with RMS Malware
  • Critical Ruby Flaw Could Lead to System Takeover
  • Sandworm Mode: New NPM Supply Chain Attack Uncovered
  • Reddit Faces £14.47 Million Fine for Child Data Breach
  • Timothy Youngblood’s Journey: From CISO to Angel Investor

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News