Release Date: May 24, 2016
Support for SSLv3 protocol is enabled by default and is configurable.
Note: To disable SSLv3 in your vSphere environment, you need to update ESXi to ESXi 5.1 patch [3872664] released on 05/24/2016 and update vCenter Server to vCenter Server 5.1 Update 3d first and then manually disable SSLv3 through configuration settings, for more information, see KB 2139396.
ESXi hosts updated to ESXi 5.1 patch [3872664] released on 05/24/2016 can be managed by older vCenter Server only if SSLv3 is not disabled in ESXi hosts.
VMware highly recommends you to update ESXi hosts to ESXi 5.1 patch [3872664] while managing them from vCenter Server 5.1 Update 3d.
The following products might not work if SSLv3 is disabled in vSphere 5.1 environment:
Bulletin ID | Category | Severity | Knowledge Base Article |
ESXi510-201605401-BG | Bug Fix | Critical | 2141430 |
ESXi510-201605402-BG | Bug Fix | Important | 2141431 |
ESXi510-201605101-SG | Security | Critical | 2141432 |
ESXi510-201605102-SG | Security | Important | 2141434 |
Image Profiles
Image Profile Name | Knowledge Base Article |
ESXi-5.1.0-20160504001-standard | |
ESXi-5.1.0-20160504001-no-tools | |
ESXi-5.1.0-20160501001s-standard | |
ESXi-5.1.0-20160501001s-no-tools |
For information on patch and update classification, see KB 2014447.
The typical way to apply patches to ESXi hosts is through the VMware Update Manager. For details, see the Installing and Administering VMware vSphere Update Manager.
ESXi hosts can be updated by manually downloading the patch ZIP file from the VMware download page and installing the VIB by using the esxcli software vib command. Additionally, the system can be updated using the image profile and the esxcli software profile command.
For details, see the vSphere Command-Line Interface Concepts and Examples and the vSphere Upgrade Guide.