PowerEdge: VMware ESXi - How to Address Vulnerabilities Using vLCM in vCenter Server
Summary:
Several requests regarding custom ISOs for the latest VMware patch releases for ESXi 7.0 and ESXi 8.0 have been received. The new VMware patch includes critical security updates for
vulnerabilities CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226. VMSA-2025-0004 is the official Broadcom article number which is commonly use to explain the issue to Tech Support.
...
Please select a product to check article relevancy
This article applies to This article does not apply toThis article is not tied to any specific product.Not all product versions are identified in this article.
The VMware DE team does not have an estimated release date for the Dell custom ISOs. This article is expected to be updated when new information becomes available.
Workaround: As an alternative, Dell Technologies recommends using vLCM in vCenter Server to create a single image that incorporates the latest VMware patch and the most recent Dell vendor add-ons to upgrade ESXi hosts.
Greenfield Approach:
Apply the Latest Customized ISO:
This step sees the deploying of the latest customized ISO for the system. This would typically be a clean installation of an updated operating system, possibly with custom configurations already integrated.
Proceed with the Patch in LCM:
After the customized ISO is applied, you would then move forward with applying the patch through LCM to ensure that the system is updated to the latest patch levels.
Brownfield Approach:
Apply the Patch:
In this case, the patch would be applied on an existing system, likely already in production or operation, without a fresh installation of the customized ISO.
Apply the Latest Available Addon in LCM:
Also, you should apply any latest available addon or software package that complements the system’s operation, ensuring the system is fully up to date with the required modules and features.