As documented in VMSA-2024-0012, all versions of the vCenter Server 7.0 appliance that are prior to 7.0 Update 3r are affected by the vulnerabilities listed in the advisory.
Also, all VMware Cloud Foundation(VCF) 4.x versions are impacted by the vulnerabilities listed in the advisory.
Note: Any VCF 4x customer that patches to vCenter Server version 7.0 U3r will be limiting their forward upgrade to VCF 5.2 only (8.0 U3)
This article is for VCF 4.x customers who are in mixed BOM within the WLD and would like to mitigate the VMSA-2024-0012 vulnerability.
curl localhost/inventory/vcenters | json_pp
curl https://<sddc_manager_ip>/v1/tokens -i -X POST -H 'Content-Type: application/json' -H 'Accept: application/json' -d '{ "username" : "<SSO_USER>", "password" : "<SSO_USER_PASSWORD>" }' –insecure
curl -k 'http://<sddc-manager-fqdn>/inventory/entities/<vcenter_id_from_step 2(c)>' -i -X PATCH \
-d '{"version":"7.0.3.02000-24026615", "type":"VCENTER"}' \
-H 'Content-Type:application/json' \
-H 'Authorization: Bearer <token received in step 3(a)>'
{
"forceUpdate": true,
"versionAliasesForBundleComponentTypes": [
{
"bundleComponentType": "VCENTER",
"versionAliases": [
{
"version": "7.0.3.01500-21784236",
"aliases": [
"7.0.3.02000-24026615"
]
}
]
}
]
}