The purpose of this article is to provide guidance to upgrade vCenter Server appliance.
VCF affected Versions : All VCF 3.x versions
The information contained in this article applies to both VCF on Dell VxRail environments and vSAN Ready Nodes environments.
NOTE: Prior to initiating any upgrades, please review KB 95536 and implement the corrective action.
As documented in VMSA-2023-0023, all versions of the vCenter Server 6.7 appliance that are prior to vCenter Server 6.7 Update 3t are affected by the vulnerabilities listed in the advisory
Also, all VMware Cloud Foundation(VCF) 3.x versions are similarly impacted by the vulnerabilities listed in the advisory.
All the documented security issues are resolved in VMware vCenter Server vCenter Server 6.7 Update 3t.
VMware Cloud Foundation Version | Upgrade Options |
Prior to 3.11.x | Upgrade to 3.11 or later and apply the steps in the Workaround section of this article |
3.11.x | Apply the steps in the Workaround section of this article |
Step 1: Perform below steps on each VMware vCenter Server VM and each External PSC deployed in your VMware Cloud Foundation environment
Powered off concurrent snapshots should be taken of all PSC's and VC's in the SSO domain prior to patching.
Apply the VMware vCenter server 6.7 Update 3t patch available at the vCenter Server 6.7 Update 3t page to all external PSCs and vCenter Servers (Management & VI Domain) in the environment.
STEP 2: Perform below steps on each SDDC Manager VM deployed in your Cloud Foundation environment
5. Run the script:/home/vcf/postUpgradeRemediation_VCF3x.py
Script would validate if all your PSC's/VC's are upgraded to target version and exit
Note: Every time a new VI workload domain is created, both these steps need to be performed.