Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customize your settings, hit “Customize Settings”.Here's an overview of our use of cookies, similar technologies and how to manage them.
We can't imagine VMware would require those who adopted vCenter 8.0U2 to update their servers a second time, so have asked for clarification on whether version 8.0U2 addressed the vuln on the day of release. Unusually, VMware also released patches for versions of vCenter that have reached end of life. Versions 6.5, 6.7, and 7.0 can all find fixes.
Virtzilla revealed a second CVE, too. CVE-2023-34056 means"a malicious actor with non-administrative privileges to vCenter Server may leverage this issue to access unauthorized data." This one's rated a mere 4.3 and is covered in the patches that also address the critical vuln, which was found by Grigory Dorodnov of Trend Micro Zero Day Initiative., VMware is clearly going about business as usual ahead of its acquisition by Broadcom, due to complete on or by October 30.
United Kingdom Latest News, United Kingdom Headlines
Similar News:You can also read news stories similar to this one that we have collected from other news sources.
Source: TheRegister - 🏆 67. / 61 Read more »
Source: OK_Magazine - 🏆 12. / 84 Read more »
Source: nottslive - 🏆 96. / 52 Read more »
Source: TheSun - 🏆 64. / 61 Read more »
Source: hellomag - 🏆 24. / 68 Read more »
Source: MetroUK - 🏆 13. / 82 Read more »