Security bulletins
From time to time, we might release security bulletins related to Google Cloud VMware Engine. All security bulletins for VMware Engine are described here.
Use this XML feed to subscribe to security bulletins for this page. Subscribe
GCP-2025-054
Published: 2025年10月14日
Description
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2025-0015, multiple vulnerabilities in VMware Aria Operations and VMware Tools were privately reported to Broadcom. Patches are available to remediate these vulnerabilities in affected Broadcom products. What should I do? We recommend upgrading to VMware Aria Automation 8.18.5 and VMware Tools 13.0.5. |
Important |
GCP-2025-040
Published: 2025年07月15日
Description
| Description | Severity | Notes |
|---|---|---|
|
Per advisory VMSA-2025-0013, multiple vulnerabilities in VMware ESXi were privately reported to Broadcom. We've either already patched these vulnerabilities or are in the process of applying the necessary patches supplied by Broadcom. There are no known workarounds for these reported vulnerabilities. Once patched, your VMware Engine deployments should be running ESXi 7.0U3w or ESXi 8.0U3f or greater. What should I do?Google recommends customers to monitor their workloads on VMware Engine for any unusual activities. |
Medium to Critical |
GCP-2025-030
Published: 2025年05月23日
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2024-0017, an SQL-injection vulnerability in VMware Aria Automation was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products. What should I do?We recommend upgrading to VMware Aria Automation KB325790. |
Important |
GCP-2025-029
Published: 2025年05月23日
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2025-0006, a local privilege escalation vulnerability in VMware Aria Operations was responsibly reported to VMware. Patches are available to remediate this vulnerability in affected VMware products. What should I do?We recommend upgrading to VMware Aria Operations 8.18 HF5. |
Important |
GCP-2025-028
Published: 2025年05月23日
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2025-0003, multiple vulnerabilities in VMware Aria Operations for logs and VMware Aria Operations were privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products. What should I do?We recommend upgrading to VMware Aria Operations for Logs 8.18.3 and VMware Aria Operations to 8.18.3. |
Important |
GCP-2025-026
Published: 2025年05月15日
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2025-0008, a DOM based Cross-Site Scripting (XSS) vulnerability in VMware Aria Automation was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products. What should I do?We recommend upgrading to VMware Aria Automation 8.18.1 patch 2. |
Important |
GCP-2025-011
Published: 2025年03月06日
| Description | Severity | Notes |
|---|---|---|
|
VMware disclosed multiple vulnerabilities in VMSA-2025-0004 that impact ESXi components deployed in customer environments. VMware Engine impactYour private clouds are either already patched or are in the process of being updated to address the security vulnerability. As part of the VMware Engine service, all customers get dedicated bare metal hosts with local attached disks that are physically isolated from other hardware. This means that the vulnerability is scoped to guest VMs within your specific private cloud only. Your private clouds will be updated to 7.0u3s Build number 24534642. This is equivalent to 7.0U3s: Build number 24585291. What should I do?Follow instructions from Broadcom and your security vendors regarding this vulnerability. |
Critical |
GCP-2025-004
Published: 2025年01月16日
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2025-0001, a server-side request forgery (SSRF) vulnerability in VMware Aria Automation was responsibly reported to VMware. Patches are available to remediate this vulnerability in affected VMware products. What should I do?We recommend upgrading to VMware Aria Automation 8.18.2 HF. |
Medium |
GCP-2024-064
Published: 2024年12月10日
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2024-0022, multiple vulnerabilities in VMware Aria Operations were responsibly reported to VMware. Updates are available to remediate these vulnerabilities in the affected VMware product. What should I do?We recommend upgrading to VMware Aria Operations 8.18.2. |
Important |
GCP-2024-060
Published: 2024年10月17日
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2024-0020, multiple vulnerabilities in VMware NSX were responsibly reported to VMware. The version NSX-T running on your VMware Engine environment is not impacted by CVE-2024-38815, CVE-2024-38818, or CVE-2024-38817. What should I do?Because VMware Engine clusters are not affected by this vulnerability, no further action is required. |
Medium |
GCP-2024-059
Published: 2024年10月16日
| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2024-0021, an authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. We have applied the mitigation approved by VMware to address this vulnerability. This fix addresses a security vulnerability described in CVE-2024-38814. The image versions running in your VMware Engine private cloud don't reflect any change at this time to indicate the changes applied. Appropriate mitigations have been installed and your environment is secured from this vulnerability. What should I do?We recommend upgrading to VMware HCX version 4.9.2. |
High |
GCP-2024-051
Published: 2024年09月18日
| Description | Severity | Notes |
|---|---|---|
|
VMware disclosed multiple vulnerabilities in VMSA-2024-0019 that impact vCenter components deployed in customer environments. VMware Engine impact
What should I do?No further action is required at this time. |
Critical |
GCP-2024-040
Published: 2024年07月01日
| Description | Severity | Notes |
|---|---|---|
|
A vulnerability CVE-2024-6387 was discovered in OpenSSH server (sshd).
This vulnerability is exploitable remotely on glibc-based linux systems:
an unauthenticated remote code execution as root, because it affects
sshd's privileged code, which is not sandboxed and runs with full privileges.
What should I do?
|
Critical |
GCP-2024-037
Published: 2024年06月18日
| Description | Severity | Notes |
|---|---|---|
|
VMware disclosed multiple vulnerabilities in VMSA-2024-0012 that impact vCenter components deployed in customer environments. VMware Engine impact
What should I do?No further action is required at this time. |
Critical |
GCP-2024-016
Published: 2024年03月05日
| Description | Severity | Notes |
|---|---|---|
|
VMware disclosed multiple vulnerabilities in VMSA-2024-0006 that impact ESXi components deployed in customer environments. VMware Engine impactYour private clouds have been updated to address the security vulnerability. What should I do?No action is needed on your part. |
Critical |
GCP-2023-034
Published: 2023年10月25日
Updated: 2023年10月27日
| Description | Severity | Notes |
|---|---|---|
|
VMware disclosed multiple vulnerabilities in VMSA-2023-0023 that impact vCenter components deployed in customer environments. VMware Engine impact
What should I do?No further action is required at this time. |
Critical |
GCP-2023-027
Published: 2023年09月11日| Description | Severity | Notes |
|---|---|---|
|
VMware vCenter Server updates address multiple memory corruption vulnerabilities (CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, CVE-2023-20896) VMware Engine impactVMware vCenter Server (vCenter Server) and VMware Cloud Foundation (Cloud Foundation). What should I do?Customers are not impacted and no action needs to be taken. |
Medium |
GCP-2023-025
Published: 2023年08月08日| Description | Severity | Notes |
|---|---|---|
|
Intel recently announced Intel Security Advisory INTEL-SA-00828 impacting some of their processor families. You are encouraged to assess your risks based on the advisory. VMware Engine impactOur fleet utilizes the impacted processor families. In our deployment, the entire server is dedicated to one customer. Hence, our deployment model doesn't add any additional risk to your assessment of this vulnerability. We are working with our partners to obtain necessary patches and will be deploying these patches on priority across the fleet using the standard upgrade process in the next several weeks. What should I do?No action is needed on your part, we are working on upgrading all the impacted systems. |
High |
GCP-2021-023
Published: 2021年09月21日| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2021-0020, VMware received reports of multiple vulnerabilities in vCenter. VMware has made updates available to remediate these vulnerabilities in affected VMware products. We have already applied the patches provided by VMware for the vSphere stack to Google Cloud VMware Engine per the VMware security advisory. This update addresses the security vulnerabilities described in CVE-2021-22005, CVE-2021-22006, CVE-2021-22007, CVE-2021-22008, and CVE-2021-22010. Other non-critical security issues will be addressed in the upcoming VMware stack upgrade (per the advance notice sent in July, more details will be provided soon on the specific timeline of the upgrade). VMware Engine impactBased on our investigations, no customers were found to be impacted. What should I do?Because VMware Engine clusters are not affected by this vulnerability, no further action is required. |
Critical |
GCP-2021-010
Published: 2021年05月25日| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2021-0010, remote code execution and authentication bypass vulnerabilities in vSphere Client (HTML5) were privately reported to VMware. VMware has made updates available to remediate these vulnerabilities in affected VMware products. We have applied the patches provided by VMware for the vSphere stack per the VMware security advisory. This update addresses security vulnerabilities described in CVE-2021-21985 and CVE-2021-21986. The image versions running in your VMware Engine private cloud don't reflect any change at this time to indicate the patches applied. Please rest assured that appropriate patches have been installed and your environment is secured from these vulnerabilities. VMware Engine impactBased on our investigations, no customers were found to be impacted. What should I do?Because VMware Engine clusters are not affected by this vulnerability, no further action is required. |
Critical |
GCP-2021-002
Published: 2021年03月05日| Description | Severity | Notes |
|---|---|---|
|
Per VMware security advisory VMSA-2021-0002, VMware received reports of multiple vulnerabilities in VMware ESXi and vSphere Client (HTML5). VMware has made updates available to remediate these vulnerabilities in affected VMware products. We have applied the officially documented workarounds for the vSphere stack per the VMware security advisory. This update addresses security vulnerabilities described in CVE-2021-21972, CVE-2021-21973, and CVE-2021-21974. VMware Engine impactBased on our investigations, no customers were found to be impacted. What should I do?We recommend upgrading to the latest version of HCX. |
Critical |