Another new version for VMware vCenter Server 8.01b this time. After recent release of 8.0 U1a, this time, VMware adds more bug fixes and another batch of security patches so it is time and trigger another upgrade for infrastructure admins to keep their vSphere up-to-date.
Let's dive into the details. The vulnerabilities fixed are the follows:
This release resolves CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, and CVE-2023-20896. For more information on these vulnerabilities and their impact on VMware products, see VMSA-2023-0014.
A bug few other fixes are resolved. VMware vCenter Server 8.0 Update 1b delivers bug fixes:
vCenter 8.x installation might fail during firstboot with an error for a missing install parameter
While installing vCenter 8.x, you might see the error
cis.exceptions.InstallParameterExceptionduring the firstboot step due to a missing
upgrade.import.directoryinstall parameter. The error occurs if vCenter does not find the parameter due to VM restarts, or restores to a VM Snapshot without memory before running the firstboot configuration.
This issue is resolved in this release. The fix makes sure that the
upgrade.import.directoryinstall parameter is correctly passed during vCenter installation.
Installation and upgrades to vCenter 8.0 Update 1 fail when a vCenter Single Sign-On domain contains uppercase letters
If your vCenter Single Sign-On domain contains uppercase letters such as
[email protected], installation, patching and upgrades to vCenter 8.0 Update 1 might fail. During installation or upgrade from an earlier version, in the install wizard, you see an error such as
Failed to start the Workload Control Plane Service. During patching from 8.x, in the Virtual Appliance Management Interface, you see the error
Exception occurred in postInstallHook. Messages in the
/var/log/vmware/wcp/wcpsvc.logfile shows a failure such as:
2023-04-17T13:04:54.017Z error wcp [gcauth/gc_auth.go:94] Failed to parse VC JWKS: invalid character '<' looking for beginning of value
2023-04-17T13:04:54.017Z error wcp [gcauth/gc_auth.go:59] Unable to get VC public key configuration : invalid character '<' looking for beginning of value
2023-04-17T13:04:54.017Z fatal wcp [gcauth/gc_auth.go:47] Unable to get VC public key configuration : invalid character '<' looking for beginning of value
You can see the case of an SSO domain by using the following command:
/usr/lib/vmware-vmafd/bin/vmafd-cli get-domain-name --server-name localhost. Example output of the above command might be
This issue is resolved in this release.
If no vSphere vMotion bandwidth for migration of VMs with vGPUs is available, the vpxd service might fail at regular intervals
If vpxd restarts during a migration of VMs with vGPUs and for some reason vSphere vMotion has no bandwidth available, vpxd might start failing on regular intervals.
This issue is resolved in this release. If you already face the issue, restart the vpxd service, re-add ESXi hosts using the Quickstart workflow, and reconfigure the vSphere vMotion network to make sure bandwidth is available.
If you're working as an infrastructure admin or as a guy who maintains vSphere infrastructure, just head and download the latest upgrade for VMware vSphere. Don't forget to backup your vCenter server appliance (VCSA) before upgrading because one never knows what can happen.
Staying current with the latest release of VMware vSphere aids in meeting compliance and regulatory standards. Many industries have specific guidelines for data security and privacy, and by upgrading, you can align your infrastructure with these requirements, mitigating potential risks and avoiding penalties.
Upgrading to VMware vCenter Server 8.0 U1b can enhance the performance and stability of your virtualized environment. By leveraging the latest optimizations and bug fixes, you can ensure a smoother operation and reduce the likelihood of security-related issues caused by system instability.
Ransomware attacks have become increasingly sophisticated and devastating in recent years. These malicious attacks encrypt an organization's data, rendering it inaccessible until a ransom is paid. To combat this growing menace, VMware vSphere has several security features such as encrypted vMotion where data is encrypted while it is being migrated between hosts, providing an additional layer of protection against unauthorized access during the migration process.
Also, there is a Secure Boot ensures that only trusted software components are loaded during the boot process, preventing the execution of compromised or unauthorized code.
Another feature is vSphere Trust Authority which establishes a secure connection between vCenter Server and the ESXi hosts, ensuring the authenticity and integrity of the hosts. It safeguards against attacks that attempt to impersonate legitimate hosts or inject unauthorized changes.
The threat landscape is ever-evolving, and organizations must remain proactive in their efforts to defend against ransomware attacks and other security threats. Upgrading to the latest release of VMware vCenter Server, such as VMware vCenter Server 8.0 U1b, is a critical step in fortifying your infrastructure.
By doing so, you gain access to enhanced security features, improved ransomware mitigation measures, and compliance with regulatory requirements. Ensure the safety, stability, and resilience of your virtualized environment by staying current with VMware vSphere and safeguarding your organization's valuable data.
- VMware vSphere 8.0 U1 Announced
- VMware vSAN 8.0 U1 What's New?
- vSphere 8.0 Page
- Veeam Bare Metal Recovery Without using USB Stick (TIP)
- ESXi 7.x to 8.x upgrade scenarios
- A really FREE VPN that doesn’t suck
- Patch your ESXi 7.x again
- VMware vCenter Server 7.03 U3g – Download and patch
- Upgrade VMware ESXi to 7.0 U3 via command line
- VMware vCenter Server 7.0 U3e released – another maintenance release fixing vSphere with Tanzu
- What is The Difference between VMware vSphere, ESXi and vCenter
- How to Configure VMware High Availability (HA) Cluster
- Homelab v 8.0 (NEW)