Last week, VMware released security updates for vCenter Server in response to a number of memory corruption vulnerabilities in the DCERPC protocol implementation. When exploited, the bugs could allow an attacker to execute code or bypass authentication, which could compromise confidential data and seriously disrupt operations. We have added a new report to Lansweeper to help you find any vulnerable installs. You can find it in the vulnerability blog post.
Was this post helpful? Leave a Kudo! Did you have a similar issue and a
different solution? Share your work in the comments below and help your fellow IT Hero's! More questions? Browse
Quick Tech Solutions
If you can't find what you're looking for, create a post in our Community Forum.