7/12/22: VMware ESXi 7.0 Update 3f Release Notes

2 years ago   •   6 min read

By CloudNerve©
VMware ESXi 7.0 Update 3f | 12 JUL 2022 | ISO Build 20036589
Table of contents

ESXi 7.0 Update 3f | 12 JUL 2022 | ISO Build 20036589

Check for additions and updates to these release notes.

What's in the Release Notes

The release notes cover the following topics:

IMPORTANT: If your source system contains hosts of versions between ESXi 7.0 Update 2 and Update 3c, and Intel drivers, before upgrading to ESXi 7.0 Update 3f, see the What's New section of the VMware vCenter Server 7.0 Update 3c Release Notes, because all content in the section is also applicable for vSphere 7.0 Update 3f. Also, see the related VMware knowledge base articles: 86447, 87258, and 87308.

What's New

  • This release resolves CVE-2022-23816, CVE-2022-23825, CVE-2022-28693, and CVE-2022-29901. For more information on these vulnerabilities and their impact on VMware products, see VMSA-2022-0020.
  • ESXi 7.0 Update 3f supports vSphere Quick Boot on the following servers:

Cisco Systems Inc:

  • UCSC-C220-M6N
  • UCSC-C225-M6N
  • UCSC-C240-M6L
  • UCSC-C240-M6N
  • UCSC-C240-M6SN
  • UCSC-C240-M6SX

Dell Inc:

  • PowerEdge XR11
  • PowerEdge XR12
  • PowerEdge XE8545
  • HPE:
  • Edgeline e920
  • Edgeline e920d
  • Edgeline e920t
  • ProLiant DL20 Gen10 Plus
  • ProLiant DL110 Gen10 Plus
  • ProLiant ML30 Gen10 Plus
  • Lenovo:
  • ThinkSystem SR 860 V2

Earlier Releases of ESXi 7.0

New features, resolved, and known issues of ESXi are described in the release notes for each release. Release notes for earlier releases of ESXi 7.0 are:

For internationalization, compatibility, and open source components, see the VMware vSphere 7.0 Release Notes.

Patches Contained in This Release

This release of ESXi 7.0 Update 3f delivers the following patches:

Build Details

Download Filename:VMware-ESXi-7.0U3f-20036589-depot
Download Size:575.2 MB
Host Reboot Required:Yes
Virtual Machine Migration or Shutdown Required:Yes


ESXi Component - core ESXi VIBsESXi_7.0.3-0.50.20036589BugfixCritical
ESXi Install/Upgrade Componentesx-update_7.0.3-0.50.20036589BugfixCritical
Broadcom NetXtreme-E Network and ROCE/RDMA Drivers for VMware ESXiBroadcom-bnxt-Net-RoCE_216.0.0.0-1vmw.703.0.50.20036589BugfixCritical
Network driver for Intel(R) E810 AdaptersIntel-icen_1.4.1.20-1vmw.703.0.50.20036589BugfixCritical
Network driver for Intel(R) X722 and E810 based RDMA AdaptersIntel-irdman_1.3.1.22-1vmw.703.0.50.20036589BugfixCritical
VMware Native iSER DriverVMware-iser_1.1.0.1-1vmw.703.0.50.20036589BugfixCritical
Broadcom Emulex Connectivity Division lpfc driver for FC adaptersBroadcom-ELX-lpfc_14.0.169.26-5vmw.703.0.50.20036589BugfixCritical
LSI NATIVE DRIVERS LSU Management PluginBroadcom-lsiv2-drivers-plugin_1.0.0-12vmw.703.0.50.20036589BugfixCritical
Networking Driver for Intel PRO/1000 Family AdaptersIntel-ne1000_0.9.0-1vmw.703.0.50.20036589BugfixCritical
USB DriverVMware-vmkusb_0.1-7vmw.703.0.50.20036589BugfixCritical
ESXi Component - core ESXi VIBsESXi_7.0.3-0.45.20036586SecurityCritical
ESXi Install/Upgrade Componentesx-update_7.0.3-0.45.20036586SecurityCritical


  • Starting with vSphere 7.0, VMware uses components for packaging VIBs along with bulletins. The ESXi and esx-update bulletins are dependent on each other. Always include both in a single ESXi host patch baseline or include the rollup bulletin in the baseline to avoid failure during host patching.
  • When patching ESXi hosts by using VMware Update Manager from a version prior to ESXi 7.0 Update 2, it is strongly recommended to use the rollup bulletin in the patch baseline. If you cannot use the rollup bulletin, be sure to include all of the following packages in the patching baseline. If the following packages are not included in the baseline, the update operation fails:
  • VMware-vmkusb_0.1-1vmw.701.0.0.16850804 or higher
  • VMware-vmkata_0.1-1vmw.701.0.0.16850804 or higher
  • VMware-vmkfcoe_1.0.0.2-1vmw.701.0.0.16850804 or higher
  • VMware-NVMeoF-RDMA_1.0.1.2-1vmw.701.0.0.16850804 or higher

Rollup Bulletin

This rollup bulletin contains the latest VIBs with all the fixes after the initial release of ESXi 7.0.

Bulletin IDCategorySeverity

Image Profiles

VMware patch and update releases contain general and critical image profiles. Application of the general release image profile applies to new bug fixes.

Image Profile Name

ESXi Image

Name and VersionRelease DateCategoryDetail
ESXi70U3f-2003658912 JUL 2022BugfixBugfix image
ESXi70U3sf-2003658612 JUL 2022SecuritySecurity Image

For information about the individual components and bulletins, see the Product Patches page and the Resolved Issues section.

For information about the individual components and bulletins, see the Product Patches page and the Resolved Issues section.

Patch Download and Installation

In vSphere 7.x, the Update Manager plug-in, used for administering vSphere Update Manager, is replaced with the Lifecycle Manager plug-in. Administrative operations for vSphere Update Manager are still available under the Lifecycle Manager plug-in, along with new capabilities for vSphere Lifecycle Manager.
The typical way to apply patches to ESXi 7.x hosts is by using the vSphere Lifecycle Manager. For details, see About vSphere Lifecycle Manager and vSphere Lifecycle Manager Baselines and Images.
You can also update ESXi hosts without using the Lifecycle Manager plug-in, and use an image profile instead. To do this, you must manually download the patch offline bundle ZIP file from VMware Customer Connect. From the Select a Product drop-down menu, select ESXi (Embedded and Installable) and from the Select a Version drop-down menu, select 7.0. For more information, see the Upgrading Hosts by Using ESXCLI Commands and the VMware ESXi Upgrade guide.

Resolved Issues

The resolved issues are grouped as follows.

Known Issues

The known issues are grouped as follows.

vSphere Client Issues

  • BIOS manufacturer displays as "--" in the vSphere Client

In the vSphere Client, when you select an ESXi host and navigate to Configure > Hardware > Firmware, you see -- instead of the BIOS manufacturer name.

Workaround: For more information, see VMware knowledge base article 88937.

Miscellaneous Issues

  • USB device passthrough from ESXi hosts to virtual machines might fail

A USB modem device might simultaneously claim multiple interfaces by the VMkernel and block the device passthrough to VMs.
Workaround: You must apply the USB.quirks advanced configuration on the ESXi host to ignore the NET interface from VMkernel and allow the USB modem to passthrough to VMs. You can apply the configuration in 3 alternative ways:

  1. Access the ESXi shell and run the following command: esxcli system settings advanced set -o /USB/quirks -s 0xvvvv:0xpppp:0:0xffff:UQ_NET_IGNORE | |- Device Product ID |------- Device Vendor ID
    For example, for the Gemalto M2M GmbH Zoom 4625 Modem(vid:pid/1e2d:005b), you can have the command
    esxcli system settings advanced set -o /USB/quirks -s 0x1e2d:0x005b:0:0xffff:UQ_NET_IGNORE
    Reboot the ESXi host.
  2. Set the advanced configuration from the vSphere Client or the vSphere Web Client and reboot the ESXi host.
  3. Use a Host Profile to apply the advanced configuration.For more information on the steps, see VMware knowledge base article 80416.

Known Issues from Previous Releases

To view a list of previous known issues, click here.

Spread the word

Keep reading