<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to know vulnerabilities is applicable or not. in vCenter™ Server Discussions</title>
    <link>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2985369#M94834</link>
    <description>&lt;P&gt;VMware Skyline Health Diagnostic virtual appliance will provide the depth about the vulnerability.&lt;/P&gt;&lt;P&gt;Its free version just install appliance and upload the log bundle it will provide the depth report about existing esxi vulnerability&lt;/P&gt;</description>
    <pubDate>Tue, 05 Sep 2023 08:52:07 GMT</pubDate>
    <dc:creator>muakhtar</dc:creator>
    <dc:date>2023-09-05T08:52:07Z</dc:date>
    <item>
      <title>How to know vulnerabilities is applicable or not.</title>
      <link>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2984184#M94808</link>
      <description>&lt;P&gt;Recently, on 22nd June VMware published advisory which ID is VMSA-2023-0014. My query is this the following version of vCenter are vulnerable&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;7.0.2 build 17958471 and&amp;nbsp;7.0.3 build 21686933.&lt;/P&gt;&lt;P&gt;If you explain why it is and why not it will highly appriciable.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 27 Aug 2023 17:56:44 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2984184#M94808</guid>
      <dc:creator>imtibd</dc:creator>
      <dc:date>2023-08-27T17:56:44Z</dc:date>
    </item>
    <item>
      <title>Re: How to know vulnerabilities is applicable or not.</title>
      <link>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2984397#M94809</link>
      <description>&lt;P&gt;All vulnerablities related to this ID is resolved in&amp;nbsp;vCenter Server 7.0 Update 3m, so any version before this is vulnerable...please see release notes for the same:&lt;/P&gt;&lt;P&gt;&lt;A href="https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3m-release-notes/index.html" target="_blank"&gt;https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3m-release-notes/index.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.vmware.com/security/advisories/VMSA-2023-0014.html" target="_blank"&gt;https://www.vmware.com/security/advisories/VMSA-2023-0014.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Sachchidanand&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 09:59:18 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2984397#M94809</guid>
      <dc:creator>Sachchidanand</dc:creator>
      <dc:date>2023-08-29T09:59:18Z</dc:date>
    </item>
    <item>
      <title>Re: How to know vulnerabilities is applicable or not.</title>
      <link>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2984499#M94810</link>
      <description>&lt;P&gt;It should be also clarified inside the company what types of patches for ESXi and vCenter should be installed in a mandatory way and what types can be skipped or let's say with low priority.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But for sure security patches should be installed as a MUST&lt;/P&gt;</description>
      <pubDate>Tue, 29 Aug 2023 20:20:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2984499#M94810</guid>
      <dc:creator>maksym007</dc:creator>
      <dc:date>2023-08-29T20:20:00Z</dc:date>
    </item>
    <item>
      <title>Re: How to know vulnerabilities is applicable or not.</title>
      <link>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2985369#M94834</link>
      <description>&lt;P&gt;VMware Skyline Health Diagnostic virtual appliance will provide the depth about the vulnerability.&lt;/P&gt;&lt;P&gt;Its free version just install appliance and upload the log bundle it will provide the depth report about existing esxi vulnerability&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2023 08:52:07 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2985369#M94834</guid>
      <dc:creator>muakhtar</dc:creator>
      <dc:date>2023-09-05T08:52:07Z</dc:date>
    </item>
    <item>
      <title>Re: How to know vulnerabilities is applicable or not.</title>
      <link>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2985450#M94835</link>
      <description>&lt;P&gt;&lt;a href="https://communities.vmware.com/t5/user/viewprofilepage/user-id/3051449"&gt;@imtibd&lt;/a&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;See the response matrix section in the security advisory you raised ie&amp;nbsp;&lt;A href="https://www.vmware.com/security/advisories/VMSA-2023-0014.html" target="_blank" rel="noopener"&gt;https://www.vmware.com/security/advisories/VMSA-2023-0014.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;For ease of reference i have copied the table below. The wording may not be entirely clear, but affected versions are show in the "Running On" column. Note the 2 entries circled state "Any" version, and the Fixed version is 7.0U3m. Therefore ALL builds prior to 7.0U3m are affected.&lt;/P&gt;&lt;P&gt;You quoted vCenter version&amp;nbsp;&lt;SPAN&gt;7.0.2 build 17958471. From the vCenter builds page linked below, this maps to 7.0 Update 2b (hence=affected). The second build you quoted (7.0.3 build 21686933) is an ESXi build, and is therefore not relevant to this advisory.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;vCenter Builds -&amp;nbsp;&lt;/STRONG&gt;&lt;A href="https://kb.vmware.com/s/article/2143838" target="_blank" rel="noopener"&gt;https://kb.vmware.com/s/article/2143838&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="markey165_0-1693946056810.png" style="width: 400px;"&gt;&lt;img src="https://communities.vmware.com/t5/image/serverpage/image-id/103388iCC93DE20570B0DB9/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="markey165_0-1693946056810.png" alt="markey165_0-1693946056810.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 05 Sep 2023 20:44:49 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2985450#M94835</guid>
      <dc:creator>markey165</dc:creator>
      <dc:date>2023-09-05T20:44:49Z</dc:date>
    </item>
    <item>
      <title>Re: How to know vulnerabilities is applicable or not.</title>
      <link>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2985488#M94836</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Hello,&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Excellent consideration, but the way I see it and wanting to go to go a little further this recent bulletin is only the last published in chronological order related to a vCenter object after the "availability" of version 7.0U2b (and not limited to this product line only), all of them in one way or another are objectively "applicable". But if we want, the reasons for applying product updates does not derive only from the publication of any vulnerabilities but also to prevent / remedy known defects which, sooner or later, could impact the proper functioning of our IT infrastructures.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Then everyone acts according to his policies and priorities, there is no discussion about this.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;STRONG&gt;Regards,&lt;/STRONG&gt;&lt;BR /&gt;&lt;STRONG&gt;Ferdinando&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Sep 2023 08:10:19 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/vCenter-Server-Discussions/How-to-know-vulnerabilities-is-applicable-or-not/m-p/2985488#M94836</guid>
      <dc:creator>Kinnison</dc:creator>
      <dc:date>2023-09-06T08:10:19Z</dc:date>
    </item>
  </channel>
</rss>

