Daily Tech News, Interviews, Reviews and Updates

VMware issues a restoration patch for the vCenter Server’s vulnerability

VMware, a cloud computing software, finally restores the affected version of vCenter Server’s IWA (Integrated Windows Authentication) mechanism. vCenter Server’s vulnerability also infected the VMware’s Cloud Foundation hybrid cloud platform  deployments.

Initially, the attackers exploited the server and gained illegal access to the vCenter Server deployments. Attackers used the server to upgrade their own benefits from the vCenter’s Server.

Although, only a single restoration patch has been issued by the VMware, rest of the patches for the other affected versions are still pending. However, VMware has provided a temporary fixation to remove the virus in one of the affected server.

In order to stop the cyberattacks, VMware has advised the operators to switch to the Active Directory over LDAPs authentication OR Identity Provider Federation for AD FS (vSphere 7.0 only).

vCenter Server is the centralized management utility for VMware which is used to control and manage the virtual machines, ESXi hosts and other components. Also, the server enables the operators to manage the vSphere infrastructure from a centralized location.



Readers like you help support The Tech Outlook. When you make a purchase using links on our site, we may earn an affiliate commission. We cannot guarantee the Product information shown is 100% accurate and we advise you to check the product listing on the original manufacturer website. Thetechoutlook is not responsible for price changes carried out by retailers. The discounted price or deal mentioned in this item was available at the time of writing and may be subject to time restrictions and/or limited unit availability. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates Read More
You might also like

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Accept Read More