ESXI-65-000072 - The ESXi host must have all security patches and updates installed.

Warning! Audit Deprecated

This audit has been deprecated and will be removed in a future update.

View Next Audit Version

Information

Installing software updates is a fundamental mitigation against the exploitation of publicly-known vulnerabilities.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

If vCenter Update Manager is used on the network, hosts can be remediated from the vSphere Web Client. From the vSphere Web Client go to Hosts and Clusters >> Update Manager tab and select a non-compliant host and click the Remediate button.

To manually remediate a host the patch file must be copied locally and the following command run from an SSH session connected to the ESXi host, or from the ESXi shell:

esxcli software vib update -d <path to offline patch bundle.zip>

See Also

https://dl.dod.cyber.mil/wp-content/uploads/stigs/zip/U_VMW_vSphere_6-5_Y21M10_STIG.zip

Item Details

References: CAT|I, CCI|CCI-000366, Rule-ID|SV-207670r388482_rule, STIG-ID|ESXI-65-000072, STIG-Legacy|SV-104309, STIG-Legacy|V-94479, Vuln-ID|V-207670

Plugin: VMware

Control ID: 9a6a1e5842fad089c8b36cecad9c91d604b0547d9480918ebac4ff4a367aea99