<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019 in VMware PowerCLI Discussions</title>
    <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2844560#M101294</link>
    <description>&lt;LI-CODE lang="markup"&gt;$ESXArray = @(
    New-Object PSObject -Property @{Hostname = 'ServerNameONE';  Password = 'Passw0rd1'}
    New-Object PSObject -Property @{Hostname = 'ServerNameTWO';  Password = 'Passw0rd2'}
    New-Object PSObject -Property @{Hostname = 'ServerNameThree';  Password = 'Passw0rd3'}
)

$cmdsub = @'
/etc/init.d/slpd stop;
/etc/init.d/slpd status;
esxcli network firewall ruleset set -r CIMSLP -e 0;
chkconfig slpd off;
chkconfig --list | grep slpd;
'@

foreach($ESXHostObject in $ESXArray)
{
    Write-Host "Processing $($ESXHostObject.Hostname)"
    $secPswd = ConvertTo-SecureString $($ESXHostObject.Password) -AsPlainText -Force
    $cred = New-Object System.Management.Automation.PSCredential ('root', $secPswd)
    $ESXHost = Get-VMHost -Name $ESXHostObject.Hostname
    Get-VMHostService -VMHost $ESXHost | where{$_.Key -eq 'TSM-SSH'} | Start-VMHostService -Confirm:$false | Out-Null
    $session = New-SSHSession -ComputerName $ESXHost.Name -Credential $cred –AcceptKey
    Invoke-SSHCommand -SSHSession $session -Command $cmdSub | Select -ExpandProperty Output
    Remove-SSHSession -SSHSession $session | Out-Null
    Get-VMHostService -VMHost $ESXHost | where{$_.Key -eq 'TSM-SSH'} | Stop-VMHostService -Confirm:$false | Out-Null
}&lt;/LI-CODE&gt;</description>
    <pubDate>Thu, 29 Apr 2021 11:39:39 GMT</pubDate>
    <dc:creator>Andy90</dc:creator>
    <dc:date>2021-04-29T11:39:39Z</dc:date>
    <item>
      <title>PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019-0022</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/1860610#M63515</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I wonder if anyone already wrote script to implement workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019-0022 ?&lt;BR /&gt;One to apply:&lt;BR /&gt;&lt;A href="https://kb.vmware.com/s/article/76372" title="https://kb.vmware.com/s/article/76372"&gt;VMware Knowledge Base&lt;/A&gt; ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have asked VMware support same question but have not got any useful answer yet.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2019 03:17:00 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/1860610#M63515</guid>
      <dc:creator>Jakub__D</dc:creator>
      <dc:date>2019-12-11T03:17:00Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019-0022</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/1860611#M63516</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Moderator: Moved to PowerCLI&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2019 07:36:20 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/1860611#M63516</guid>
      <dc:creator>scott28tt</dc:creator>
      <dc:date>2019-12-11T07:36:20Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019-0022</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/1860612#M63517</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;If you are allowed to enable SSH briefly and if you have installed/can install the &lt;A href="https://www.powershellgallery.com/packages/Posh-SSH/2.1"&gt;Posh-SSH&lt;/A&gt; module, you could do&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;DIV&gt;&lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;esxName&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;=&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #8b0000;"&gt;MyEsx&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;esx&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;=&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;Get-VMHost&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;Name &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;esxName&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;cmdsub&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;=&lt;/SPAN&gt; &lt;SPAN style="color: #8b0000;"&gt;@'&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #8b0000;"&gt;/etc/init.d/slpd stop;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #8b0000;"&gt;/etc/init.d/slpd status;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #8b0000;"&gt;esxcli network firewall ruleset set -r CIMSLP -e 0;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #8b0000;"&gt;chkconfig slpd off;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #8b0000;"&gt;chkconfig --list | grep slpd;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #8b0000;"&gt;'@&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;secPswd&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;=&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;ConvertTo-SecureString&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #8b0000;"&gt;Welcome2019!&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;AsPlainText &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;Force&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;cred&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;=&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;New-Object&lt;/SPAN&gt; System.Management.Automation.PSCredential &lt;SPAN style="color: #000000;"&gt;(&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #8b0000;"&gt;root&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #a9a9a9;"&gt;,&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;secPswd&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;)&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Get-VMHostService&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;VMHost &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;esx&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;|&lt;/SPAN&gt; &lt;SPAN style="color: #00008b;"&gt;where&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;{$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;_.Key&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-eq&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #8b0000;"&gt;TSM-SSH&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;}&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;|&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;Start-VMHostService&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;Confirm:&lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #008080;"&gt;false&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;|&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;Out-Null&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;&lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;session&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;=&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;New-SSHSession&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;ComputerName &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;esx.Name&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;Credential &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;cred&lt;/SPAN&gt; –AcceptKey&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Invoke-SSHCommand&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;SSHSession &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;session&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;Command &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;cmdSub&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;|&lt;/SPAN&gt; Select &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;ExpandProperty Output&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Remove-SSHSession&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;SSHSession &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;session&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;|&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;Out-Null&lt;/SPAN&gt;&lt;/P&gt;&lt;BR /&gt;&lt;P&gt;&lt;SPAN style="color: #0000ff;"&gt;Get-VMHostService&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;VMHost &lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;esx&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;|&lt;/SPAN&gt; &lt;SPAN style="color: #00008b;"&gt;where&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;{$&lt;/SPAN&gt;&lt;SPAN style="color: #ff4500;"&gt;_.Key&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-eq&lt;/SPAN&gt; &lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #8b0000;"&gt;TSM-SSH&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;'&lt;/SPAN&gt;&lt;SPAN style="color: #000000;"&gt;}&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;|&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;Stop-VMHostService&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;-&lt;/SPAN&gt;Confirm:&lt;SPAN style="color: #000000;"&gt;$&lt;/SPAN&gt;&lt;SPAN style="color: #008080;"&gt;false&lt;/SPAN&gt; &lt;SPAN style="color: #a9a9a9;"&gt;|&lt;/SPAN&gt; &lt;SPAN style="color: #0000ff;"&gt;Out-Null&lt;/SPAN&gt;&lt;/P&gt;&lt;/DIV&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 11 Dec 2019 09:51:40 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/1860612#M63517</guid>
      <dc:creator>LucD</dc:creator>
      <dc:date>2019-12-11T09:51:40Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2811066#M98240</link>
      <description>&lt;P&gt;Thanks, this script worked as advertised.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 19 Nov 2020 16:38:08 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2811066#M98240</guid>
      <dc:creator>GeoPerkins</dc:creator>
      <dc:date>2020-11-19T16:38:08Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2832494#M100038</link>
      <description>&lt;P&gt;&lt;STRONG&gt;Ansible playbook to apply Workaround for OpenSLP security vulnerability in ESXi 6.x&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;&lt;A href="https://gist.github.com/szemmali/6b2c257f8567cda1dbb92b8e92f3e06c" target="_blank"&gt;https://gist.github.com/szemmali/6b2c257f8567cda1dbb92b8e92f3e06c&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Feb 2021 20:50:22 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2832494#M100038</guid>
      <dc:creator>szemmali</dc:creator>
      <dc:date>2021-02-25T20:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2832611#M100050</link>
      <description>&lt;P&gt;/Hi Luc,&lt;/P&gt;&lt;P&gt;Thanks for above script but can we do this same at vCenter level which dont ask for ESXi root password as we have different different root passwords for all the ESXi hosts to perform this CIMSLP actions ?&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 14:09:37 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2832611#M100050</guid>
      <dc:creator>rachappachalmi</dc:creator>
      <dc:date>2021-02-26T14:09:37Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2832614#M100051</link>
      <description>&lt;P&gt;Not really, the commands need to be run on the ESXi node.&lt;BR /&gt;Except for the esxcli command, there is no alternative for these commands on the vCenter level&lt;/P&gt;</description>
      <pubDate>Fri, 26 Feb 2021 14:12:44 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2832614#M100051</guid>
      <dc:creator>LucD</dc:creator>
      <dc:date>2021-02-26T14:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2832974#M100088</link>
      <description>&lt;P&gt;Hi Luc,&lt;/P&gt;&lt;P&gt;Oh ok, got it,&lt;/P&gt;&lt;P&gt;Actually we have around 2157 ESXi hosts and majority of them have same root passwords, hence I was looking for an option to apply this script once for all of them.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 10:16:11 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2832974#M100088</guid>
      <dc:creator>rachappachalmi</dc:creator>
      <dc:date>2021-03-01T10:16:11Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833068#M100099</link>
      <description>&lt;P&gt;Hi Luc,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Will you be able to help me use this script for multiple hosts pls ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;BR /&gt;Rachappa&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 14:15:37 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833068#M100099</guid>
      <dc:creator>rachappachalmi</dc:creator>
      <dc:date>2021-03-01T14:15:37Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833080#M100100</link>
      <description>&lt;P&gt;Where and how do you provide the names of those ESXi nodes?&lt;/P&gt;
&lt;P&gt;In a file?&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 15:07:46 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833080#M100100</guid>
      <dc:creator>LucD</dc:creator>
      <dc:date>2021-03-01T15:07:46Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833108#M100109</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Can't this be set using:&lt;/P&gt;&lt;P&gt;$ESXi = Get-VMHost xpto&lt;BR /&gt;$slpd = $ESXi | Get-VMHostService | Where {$_.key -eq "slpd"}&lt;/P&gt;&lt;P&gt;if(($slpd.policy -eq "on") -or ($slpd.policy -eq "automatic"))&lt;BR /&gt;{&lt;BR /&gt;$slpd | set-VMHostService -Policy Off -Confirm:$false&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;if ($slpd.running)&lt;BR /&gt;{&lt;BR /&gt;$slpd | Stop-VMHostService -Confirm:$false&lt;BR /&gt;}&lt;/P&gt;&lt;P&gt;Thank you&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 16:55:49 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833108#M100109</guid>
      <dc:creator>LexCosta</dc:creator>
      <dc:date>2021-03-01T16:55:49Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833116#M100111</link>
      <description>&lt;P&gt;I don't think that this will make the change persistent across reboots of the ESXi node.&lt;BR /&gt;That's what the chkconfig command is doing.&lt;/P&gt;</description>
      <pubDate>Mon, 01 Mar 2021 17:23:30 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833116#M100111</guid>
      <dc:creator>LucD</dc:creator>
      <dc:date>2021-03-01T17:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833256#M100129</link>
      <description>&lt;P&gt;Hi Luc ,&lt;/P&gt;&lt;P&gt;I have two requests to you.&lt;/P&gt;&lt;P&gt;1 - I am trying to use multiple hosts like below in your above script but its not working&amp;nbsp;&lt;/P&gt;&lt;P&gt;$esxName = @("myesxi1","myesxi2")&amp;nbsp;&lt;/P&gt;&lt;P&gt;$esx = Get-VMHost -Name $esxName&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;$cmdsub = @'&lt;/P&gt;&lt;P&gt;/etc/init.d/slpd stop;&lt;/P&gt;&lt;P&gt;/etc/init.d/slpd status;&lt;/P&gt;&lt;P&gt;esxcli network firewall ruleset set -r CIMSLP -e 0;&lt;/P&gt;&lt;P&gt;chkconfig slpd off;&lt;/P&gt;&lt;P&gt;chkconfig --list | grep slpd;&lt;/P&gt;&lt;P&gt;'@&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;$secPswd = ConvertTo-SecureString 'ESXI510U2' -AsPlainText -Force&lt;/P&gt;&lt;P&gt;$cred = New-Object System.Management.Automation.PSCredential ('root', $secPswd)&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Get-VMHostService -VMHost $esx | where{$_.Key -eq 'TSM-SSH'} | Start-VMHostService -Confirm:$false | Out-Null&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;$session = New-SSHSession -ComputerName $esx.Name -Credential $cred –AcceptKey&lt;/P&gt;&lt;P&gt;Invoke-SSHCommand -SSHSession $session -Command $cmdSub | Select -ExpandProperty Output&lt;/P&gt;&lt;P&gt;Remove-SSHSession -SSHSession $session | Out-Null&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;Get-VMHostService -VMHost $esx | where{$_.Key -eq 'TSM-SSH'} | Stop-VMHostService -Confirm:$false | Out-Null&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2 - We have standalone ESXi hosts around 178 and your original script is not working for them too, can you help on this as well (again password is same for all)&lt;/P&gt;</description>
      <pubDate>Tue, 02 Mar 2021 08:42:20 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833256#M100129</guid>
      <dc:creator>rachappachalmi</dc:creator>
      <dc:date>2021-03-02T08:42:20Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833258#M100130</link>
      <description>&lt;P&gt;Hi Lex,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Sorry i am weak in scripting and i did not understand where to mention my ESXi list here in your script.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Mar 2021 08:44:23 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833258#M100130</guid>
      <dc:creator>rachappachalmi</dc:creator>
      <dc:date>2021-03-02T08:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833262#M100133</link>
      <description>&lt;P&gt;Hi Luc,&lt;/P&gt;&lt;P&gt;Yes, if it takes from file also fine or if we need to mention in the script also fine, but need to do it for multiple hosts.&lt;/P&gt;</description>
      <pubDate>Tue, 02 Mar 2021 08:49:25 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833262#M100133</guid>
      <dc:creator>rachappachalmi</dc:creator>
      <dc:date>2021-03-02T08:49:25Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833352#M100142</link>
      <description>&lt;P&gt;Hi Lucd&amp;nbsp;&lt;/P&gt;&lt;P&gt;CAn the script connects&amp;nbsp; the Vcenter and get all esxi host and apply this setings&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Mar 2021 16:39:28 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833352#M100142</guid>
      <dc:creator>Loagu</dc:creator>
      <dc:date>2021-03-02T16:39:28Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833360#M100143</link>
      <description>&lt;P&gt;You can do this in a loop.&lt;BR /&gt;This assumes you have already connected to the VCSA and that the credentials for all ESXi nodes are the same.&lt;/P&gt;&lt;LI-CODE lang="csharp"&gt;$cmdsub = @'
/etc/init.d/slpd stop;
/etc/init.d/slpd status;
esxcli network firewall ruleset set -r CIMSLP -e 0;
chkconfig slpd off;
chkconfig --list | grep slpd;
'@

$secPswd = ConvertTo-SecureString 'Welcome2019!' -AsPlainText -Force
$cred = New-Object System.Management.Automation.PSCredential ('root', $secPswd)

Get-VMHost -PipelineVariable esx |
    ForEach-Object -Process {
        Get-VMHostService -VMHost $esx | where { $_.Key -eq 'TSM-SSH' } | Start-VMHostService -Confirm:$false | Out-Null

        $session = New-SSHSession -ComputerName $esx.Name -Credential $cred –AcceptKey
        Invoke-SSHCommand -SSHSession $session -Command $cmdSub | select -ExpandProperty Output
        Remove-SSHSession -SSHSession $session | Out-Null

        Get-VMHostService -VMHost $esx | where { $_.Key -eq 'TSM-SSH' } | Stop-VMHostService -Confirm:$false | Out-Null
    }&lt;/LI-CODE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 02 Mar 2021 17:17:18 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833360#M100143</guid>
      <dc:creator>LucD</dc:creator>
      <dc:date>2021-03-02T17:17:18Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833484#M100156</link>
      <description>&lt;P&gt;Hi Luc, Its working for me, thanks a lot for all your help as always &lt;img class="lia-deferred-image lia-image-emoji" src="https://communities.vmware.com/html/@7651DD0E8772B3B5D93ADA9ABA2E067C/emoticons/1f642.png" alt=":slightly_smiling_face:" title=":slightly_smiling_face:" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 06:03:30 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833484#M100156</guid>
      <dc:creator>rachappachalmi</dc:creator>
      <dc:date>2021-03-03T06:03:30Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833712#M100188</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;by setting up the policy to off the slpd service will not start after the esxi reboots, exactly the same way that ssh service doesn’t start after the esxi reboots if the policy is set to off on this service as well&lt;/P&gt;</description>
      <pubDate>Wed, 03 Mar 2021 22:52:26 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833712#M100188</guid>
      <dc:creator>LexCosta</dc:creator>
      <dc:date>2021-03-03T22:52:26Z</dc:date>
    </item>
    <item>
      <title>Re: PowerCLI - Workaround for OpenSLP security vulnerability in ESXi 6.x (CVE-2019-5544) / VMSA-2019</title>
      <link>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833859#M100208</link>
      <description>&lt;P&gt;HI Lucid&amp;nbsp;&lt;/P&gt;&lt;P&gt;Am getting below errors can you suggest on this&amp;nbsp;&lt;/P&gt;&lt;P&gt;New-SSHSession : Could not load file or assembly 'Renci.SshNet, Version=2016.1.0.0, Culture=neutral, PublicKeyToken=1cee9f8bde3db106' or one of its dependencies. The system cannot&lt;BR /&gt;find the file specified.&lt;BR /&gt;At line:16 char:20&lt;BR /&gt;+ ... $session = New-SSHSession -ComputerName $esx.Name -Credential $cred ...&lt;BR /&gt;+ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~&lt;BR /&gt;+ CategoryInfo : NotSpecified: (:) [New-SSHSession], FileNotFoundException&lt;BR /&gt;+ FullyQualifiedErrorId : System.IO.FileNotFoundException,SSH.NewSshSession&lt;BR /&gt;&lt;BR /&gt;Invoke-SSHCommand : Cannot bind argument to parameter 'SSHSession' because it is null.&lt;BR /&gt;At line:17 char:39&lt;BR /&gt;+ Invoke-SSHCommand -SSHSession $session -Command $cmdSub | sel ...&lt;BR /&gt;+ ~~~~~~~~&lt;BR /&gt;+ CategoryInfo : InvalidData: (:) [Invoke-SSHCommand], ParameterBindingValidationException&lt;BR /&gt;+ FullyQualifiedErrorId : ParameterArgumentValidationErrorNullNotAllowed,Invoke-SSHCommand&lt;/P&gt;</description>
      <pubDate>Thu, 04 Mar 2021 13:32:31 GMT</pubDate>
      <guid>https://communities.vmware.com/t5/VMware-PowerCLI-Discussions/PowerCLI-Workaround-for-OpenSLP-security-vulnerability-in-ESXi-6/m-p/2833859#M100208</guid>
      <dc:creator>Loagu</dc:creator>
      <dc:date>2021-03-04T13:32:31Z</dc:date>
    </item>
  </channel>
</rss>

