Back to CVE risk briefs

External risk intelligence

VMware Aria Operations could allow external attackers to take control during migration.

VMware Aria Operations could allow external attackers to remotely execute commands during support-assisted migrations, potentially compromising operational systems and infrastructure. This vulnerability is subject to active exploitation in the wild, posing a significant risk during these maintenance activities.

NVD published February 25, 2026 (3 months ago)

External risk briefKnown Exploit

CVE-2026-22719

Halo Surface Signal

1/ 5

The vulnerability is restricted to a specific, temporary maintenance activity (support-assisted product migration) rather than standard persistent operation. It is not an inherently internet-facing service, making public network access to this vulnerability during its limited window highly unlikely.

Exposure facts

H – Horizon Alert

A security vulnerability has been identified in VMware Aria Operations involving a command injection flaw. This issue allows an unauthenticated individual to remotely execute unauthorized system commands specifically while support-assisted product migration is in progress. Because this could lead to remote code execution, it represents a significant risk to the integrity and security of the affected management environments.

A – Asset Exposure

This issue affects VMware Aria Operations and is specifically tied to environments currently undergoing a support-assisted product migration. If this specific maintenance activity is active, the vulnerability could allow an unauthorized actor to execute commands on the system, potentially compromising operational systems or gaining unauthorized access to the underlying infrastructure. Because this risk is linked to a distinct migration process rather than standard day-to-day operations, exposure is generally limited to that specific maintenance window.

L – Live Threat

This vulnerability is included in the CISA Known Exploited Vulnerabilities catalog, which confirms that it is subject to active exploitation in the wild. The flaw permits unauthenticated remote code execution, creating a demonstrated risk of targeting by malicious actors. Given these confirmed threat signals, this vulnerability warrants significant attention regarding our security posture.

O – Operational Fix

Please prioritize the official vendor guidance for VMware Aria Operations to address this security concern. Instruct your technical team to review the Response Matrix in the relevant security advisory to either apply the available patches or implement the recommended workarounds. Completing these steps is the recommended path for maintaining the security of your environment.

References