• Skip to primary navigation
  • Skip to main content
site logo
  • About
    • Approach
    • Partnerships
    • Mission
    • Leadership
    • Awards
    • Arraya Cares
  • Solutions
    • Solutions

    • Hybrid Infrastructure
      • Hyperconverged
      • Infrastructure as a Service
      • Servers, Storage, and Virtualization
      • Data Protection
      • Disaster Recovery & Business Continuity
    • Apps & Data
      • AI
      • Automation
      • Customizations
      • Visualizations & Integrations
      • Migrations
    • Network
      • Enterprise Networks
      • Wireless Connectivity
      • Cloud Networking Solutions
      • IoT
    • Cybersecurity
      • Endpoint Security
      • Network Security
      • Cloud Security
      • Application Security
    • Modern Workplace
      • Microsoft Licensing
      • Productivity & Collaboration
      • Modern Endpoint Deployment & Management
      • Microsoft Compliance & Risk
      • Backup
      • Cloud
  • Services
    • Services

    • Managed Services
      • Service Desk
      • Outsourced IT
      • Managed Security
      • Managed NOC
      • Arraya Adaptive Management for Microsoft Technologies
      • ADEPT: Arraya's White Label Program
    • Advisory Services
      • Assessments
      • Strategy
      • vCTO
      • vCISO
      • Enterprise Architecture
    • Staffing
      • Infrastructure Engineering
      • Security & Compliance
      • Application & Software
    • Professional Services
      • Project Management 
      • Systems Integration 
      • Mergers & Acquisitions
      • Knowledge & Skills Transfer 
  • Industries
    • Education
    • Finance
    • Healthcare
    • Legal
    • Manufacturing
    • Software and Services
  • Insights
    • News
    • Blog
    • Events
    • Videos
    • Case studies
  • Careers
  • CSP Login
search icon
Contact Us

Critical vCenter Server 6.7 Bug You Need to Patch ASAP

You Need To Patch This Critical vCenter Server 6.7 Bug ASAP

It can be tough to keep up with applying patches under normal circumstances and the last few weeks have certainly been anything but normal. However, if you use vCenter Server 6.7 (with embedded or external platform services controller [PSC]) to help manage your organization’s data center, you’ll want patching at the top of your team’s to do list. Earlier this month, VMware disclosed a high-risk vulnerability affecting certain versions of vCenter Server 6.7 and PSC, one that checks in at 10 out of 10 on the CVSS v3 scale. If left unaddressed, this vulnerability leaves vCenter Server and other critical services dangerously exposed.

The vulnerability documented in VMSA-2020-0006 exists in VMware Directory Service (vmdir), one of the component tools found in vCenter Server. Essentially, it leaves this utility unable to manage access controls correctly. As a result, any solution that depends upon vmdir for identity authentication, including vCenter Server, could be compromised by attackers. At that point, cyber criminals could spin up their own admin accounts and grant themselves free rein throughout an environment.

Here’s the thing, not all instances of vCenter 6.7 are impacted by the vulnerability. A deployment must meet a few qualifications in order to be considered at risk. First off, the instance must predate the 6.7u3f upgrade. A deployment must also have been upgraded from a previous incarnation of the vCenter Server family, 6.5, 6.0, etc. Brand new vCenter Server deployments should be unaffected by the vulnerability according to VMware. So how worried should organizations be whose vCenter Server deployments do check off all those boxes? A representative from the virtualization giant offered a sufficiently ominous answer to that exact question in a blog post detailing the vulnerability, responding: “very worried.” This was aimed directly at organizations whose internal policies or structures deemphasize patching or that make changing on the fly difficult.

Remediating this vulnerability is straightforward enough. Environment admins should locate and apply the most recent available update in their vCenter Server Appliance Management Interface (VAMI). It’s worth noting that there might be multiple updates listed, so it’s important to pick the most current version. Additionally, it’s best practice to have a system-wide backup on hand prior to implementing the patch just in case something were to go wrong. Finally, admins should be sure they update all vCenter Server and PSC instances within their organization’s data center.

At the moment, there is no direct workaround for this issue. Firewalls or even network segmentations strategies can be used to mitigate the hazard, however doing so is not a true fix. Further, it may add greater complexity to already intricate environments. Instead, an organization’s best defense is patching. Only after its full complement of vCenter Server and PSC solutions is upgraded to the 6.7u3f level, will an environment be secured against this potentially devastating threat. 

Next Steps: Keeping your vCenter Server and data center safe

Need a hand updating your vCenter Server and PSC instances against this vulnerability? Arraya can help. Our managed services team can deploy the patches and updates needed to keep vCenter (and other solutions) secure. Arraya’s in-house experts can also help your organization take stock of its current level of exposure as well as devise and execute a remediation plan. You can start a dialogue with our team by visiting https://www.arrayasolutions.com//contact-us/.

Also, don’t forget, you can leave us a comment on this or any of our blogs through social media. Arraya can be found on LinkedIn, Twitter, and Facebook. While you’re there, follow us to stay up to date on our industry insights and unique IT learning opportunities.

Arraya Insights
Back to Top
Arraya Solutions logo

We combine technological expertise and personal service to educate and empower our customers to solve their individual IT challenges.

518 Township Line Road
Suite 250, Blue Bell, PA 19422

p: (866) 229-6234     f: (610) 684-8655
e: info@arrayasolutions.com

  • Careers
  • Privacy Policy
  • Contact Us

© 2025 Arraya Solutions. All rights reserved.

Facebook Twitter YouTube LinkedIn
Manage Cookie Consent
We use cookies to enhance your experience. By selecting “Accept,” you agree to our cookie policy.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}