Skip to content
.ca
3 minhigh

CISA Adds Two Known Exploited Vulnerabilities to Catalog

CISA has added two actively exploited vulnerabilities, CVE-2026-21385 (Qualcomm Memory Corruption) and CVE-2026-22719 (VMware Aria Operations Command Injection), to its Known Exploited Vulnerabilities (KEV) Catalog. Organizations are strongly urged to prioritize patching these flaws to reduce exposure to cyberattacks.

Sens:ImmediateConf:highAnalyzed:2026-03-03reports

Authors: CISA

Source:CISA

Key Takeaways

  • CISA has added two new vulnerabilities to the Known Exploited Vulnerabilities (KEV) Catalog due to active exploitation.
  • CVE-2026-21385 is a memory corruption vulnerability affecting Qualcomm Multiple Chipsets.
  • CVE-2026-22719 is a command injection vulnerability affecting Broadcom VMware Aria Operations.
  • Federal Civilian Executive Branch (FCEB) agencies are mandated to remediate these vulnerabilities by the specified due date per BOD 22-01.
  • All organizations are strongly urged to prioritize patching these vulnerabilities to reduce cyberattack exposure.

Affected Systems

  • Qualcomm Multiple Chipsets
  • Broadcom VMware Aria Operations

Vulnerabilities (CVEs)

  • CVE-2026-21385
  • CVE-2026-22719

Attack Chain

Malicious cyber actors are actively exploiting CVE-2026-21385 (memory corruption in Qualcomm chipsets) and CVE-2026-22719 (command injection in VMware Aria Operations). Specific exploitation chains, payloads, and post-exploitation activities are not detailed in the alert, but these vulnerabilities likely serve as initial access, privilege escalation, or remote code execution vectors.

Detection Availability

  • YARA Rules: No
  • Sigma Rules: No
  • Snort/Suricata Rules: No
  • KQL Queries: No
  • Splunk SPL Queries: No
  • EQL Queries: No
  • Other Detection Logic: No

No specific detection rules or queries are provided in the CISA alert.

Detection Engineering Assessment

EDR Visibility: Medium — EDR may detect post-exploitation activity such as command injection child processes from VMware Aria Operations, but memory corruption on Qualcomm chipsets (often mobile/embedded) typically lacks standard EDR visibility. Network Visibility: Medium — Network sensors might detect anomalous inbound requests targeting VMware Aria Operations, but encrypted payloads or mobile network traffic (Qualcomm) may be blind spots. Detection Difficulty: Moderate — Detecting the exploitation attempts requires specific application logging and baseline understanding of VMware Aria Operations process trees. Qualcomm chipset exploitation is inherently difficult to detect without specialized mobile/hardware telemetry.

Required Log Sources

  • Web Application Firewall (WAF) logs
  • Application logs (VMware Aria)
  • Process creation logs (Event ID 4688 / Sysmon Event ID 1 / Linux auditd)

Hunting Hypotheses

HypothesisTelemetryATT&CK StageFP Risk
Look for unexpected child processes spawning from VMware Aria Operations web or application services, indicating potential command injection (CVE-2026-22719).Process creation logsExecutionLow

Control Gaps

  • Lack of mobile/hardware-level telemetry for Qualcomm chipsets
  • Insufficient application-layer inspection for VMware Aria Operations

Key Behavioral Indicators

  • Anomalous child processes from VMware Aria services
  • Unexpected shell execution (sh, bash, cmd) by application service accounts

False Positive Assessment

  • Low

Recommendations

Immediate Mitigation

  • Identify all instances of Qualcomm chipsets and VMware Aria Operations in the environment.
  • Apply vendor-supplied patches or updates for CVE-2026-21385 and CVE-2026-22719 immediately.

Infrastructure Hardening

  • Restrict network access to VMware Aria Operations interfaces to authorized management IP ranges only.
  • Implement Web Application Firewalls (WAF) in front of public-facing or critical internal web applications.

User Protection

  • Ensure mobile device management (MDM) policies require the latest OS and firmware updates for devices using Qualcomm chipsets.

Security Awareness

  • Communicate the urgency of BOD 22-01 compliance to relevant IT and vulnerability management stakeholders.

MITRE ATT&CK Mapping

  • T1190 - Exploit Public-Facing Application
  • T1059 - Command and Scripting Interpreter
  • T1068 - Exploitation for Privilege Escalation