[CIVN-2026-0110] Multiple Vulnerabilities in VMware Products

By Published On: February 27, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in VMware Products


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: HIGH


Software Affected


VMware Aria Operations

VMware Cloud Foundation

VMware Telco Cloud Platform

VMware Telco Cloud Infrastructure

Overview


Multiple vulnerabilities have been reported in VMware products, which could allow an attacker to execute arbitrary commands, inject malicious scripts, and escalate privileges on the targeted VMware environment.


Target Audience:

Enterprises and large organizations, cloud service providers, telecom operators, managed service providers, and organizations utilizing VMware Aria Operations and associated VMware infrastructure products.


Risk Assessment:

High risk of unauthorized access, administrative compromise, and remote command execution in affected VMware Aria Operations deployments and integrated VMware environments.


Impact Assessment:

Remote command execution, stored cross-site scripting (XSS), privilege escalation.


Description


VMware provides virtualization and cloud infrastructure solutions that enable organizations to manage virtual environments, monitor workloads, and operate large-scale infrastructure platforms.


Multiple vulnerabilities have been reported in VMware Aria Operations and products in which it is integrated. These vulnerabilities include a command injection vulnerability, a stored cross-site scripting (XSS) vulnerability, and a privilege escalation vulnerability arising from improper input handling and insufficient access controls in certain components. An attacker could exploit these vulnerabilities by sending specially crafted requests or leveraging existing permissions to execute arbitrary commands, inject malicious scripts, or elevate privileges within the targeted VMware environment.


Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary commands, inject malicious scripts, and escalate privileges on the targeted VMware environment.


Solution


Apply appropriate updates as mentioned as mentioned by the Vendor:

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947



Vendor Information


VM Products

https://www.vmware.com/


References


 

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947


CVE Name

CVE-2026-22719

CVE-2025-22720

CVE-2026-22721


 




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmhscoACgkQ3jCgcSdc

ys9Qvw//dgC0J78wAkpGGiK4Dc3wztP657anss9pVWYLWJPwiNdXT1Mf44cgxczU

HOsYMM0XpEWCeKFfwV7BCRW7Iguo4I1xE5BlKUUCj4luheYDplRmZyttzLNle7oL

f9AntINRZbupYFAOspVupt/JxJH2pfsQICjI/hfeQrU7GcdrtYlJMdLSKrJiyRYB

WfaDhYSFPxPnXitIkgrEVCy70vugwdpCwNctf2HQtQrcBPE623NVQ7g8nDCaezpE

g0lTglsbN84R/pz6AKwdsfluUIZzL9wBPKMGJWFdqix65euUpYlc6gay9ZNOCwD2

CHD+qIntlb1wh0xhNjC8c9k9TVOPtO6+OVjxedciDtb1KNJztE8EpGXQS+tPw9Vv

ifZRBSDdn4hOOBuOAyRlTZIh3k2dgwJwAPjK3ZcA5CUHrLTCLjqlbyCeCksXCuFE

Ks7WVI+GrsK2Z81Tr6rU07mo2jvsJXb6qjs6qkG5itKjtoe08nsCRSE+FiLLdRVT

BBiPRiNLXmLpvmU7nWEYrlCq1f1qav7siPDsdxPWPmMR8uxK2WlDvnlCSAGKVPA7

MdydTODcMidR+EoEwqSvnrh06uQwTDritf7UpI75HpPWA5ApTk1Zhe1n66qqhVMN

MHC3O8yRE5vJssvV6cppCxh0DbTr7ryfc2ZoAF8eU9SH/L+8guA=

=04Hv

—–END PGP SIGNATURE—–

Share this article