HOWTO: CVE-2021-44228 - (87081) : vCenter Server 6.0/6.5/6.7/7.0 remediation instructions.

2 years ago   •   1 min read

By CloudNerve.com

HOWTO: CVE-2021-44228 – (87081) : vCenter Server 6.0/6.5/6.7/7.0 remediation instructions.

https://kb.vmware.com/s/article/87081

CVE-2021-44228 has been determined to impact vCenter Server 7.0.x, vCenter 6.7.x & vCenter 6.5.x via the Apache Log4j open source component it ships. 

This vulnerability and its impact on VMware products are documented in the following VMware Security Advisory (VMSA), please review this document before continuing:

Highlighted sections indicate the most recent updates. See the Change log at the end of this article for all changes and subscribe the article for updates.

 Impact / Risks
  • VCHA needs to be removed before executing the steps in this KB article.
  • Environments with external PSCs need to have the steps taken on both vCenter and PSC appliances.
Resolution
The workarounds described in this document are meant to be a temporary solution only.

Upgrades documented in the aforementioned advisory should be applied to remediate CVE-2021-44228 when available.

Spread the word

Keep reading