
[CIVN-2026-0110] Multiple Vulnerabilities in VMware Products
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in VMware Products
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
VMware Aria Operations
VMware Cloud Foundation
VMware Telco Cloud Platform
VMware Telco Cloud Infrastructure
Overview
Multiple vulnerabilities have been reported in VMware products, which could allow an attacker to execute arbitrary commands, inject malicious scripts, and escalate privileges on the targeted VMware environment.
Target Audience:
Enterprises and large organizations, cloud service providers, telecom operators, managed service providers, and organizations utilizing VMware Aria Operations and associated VMware infrastructure products.
Risk Assessment:
High risk of unauthorized access, administrative compromise, and remote command execution in affected VMware Aria Operations deployments and integrated VMware environments.
Impact Assessment:
Remote command execution, stored cross-site scripting (XSS), privilege escalation.
Description
VMware provides virtualization and cloud infrastructure solutions that enable organizations to manage virtual environments, monitor workloads, and operate large-scale infrastructure platforms.
Multiple vulnerabilities have been reported in VMware Aria Operations and products in which it is integrated. These vulnerabilities include a command injection vulnerability, a stored cross-site scripting (XSS) vulnerability, and a privilege escalation vulnerability arising from improper input handling and insufficient access controls in certain components. An attacker could exploit these vulnerabilities by sending specially crafted requests or leveraging existing permissions to execute arbitrary commands, inject malicious scripts, or elevate privileges within the targeted VMware environment.
Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary commands, inject malicious scripts, and escalate privileges on the targeted VMware environment.
Solution
Apply appropriate updates as mentioned as mentioned by the Vendor:
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947
Vendor Information
VM Products
https://www.vmware.com/
References
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36947
CVE Name
CVE-2026-22719
CVE-2025-22720
CVE-2026-22721
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=04Hv
—–END PGP SIGNATURE—–


