Cybersecurity, Cybersecurity News, VMware, Vulnerabilities

7/12/22: VMware ESXi 7.0 Update 3f Release Notes

0 0
Share This Content
Read Time:8 Minute, 15 Second

Way late on posting this ESXi 7 release from last month, but here are latest VMware ESXi 7.0 Update 4f Build 20036589 security update releases.

See ESXi 7.0 Update 4f Build 20036589 release notes in this post, at and at the following link for full details on this ESXi image release set:

ESXi 7.0 Update 3f | 12 JUL 2022 | ISO Build 20036589

What’s in the Release Notes

The release notes cover the following topics:

IMPORTANT: If your source system contains hosts of versions between ESXi 7.0 Update 2 and Update 3c, and Intel drivers, before upgrading to ESXi 7.0 Update 3f, see the What’s New section of the VMware vCenter Server 7.0 Update 3c Release Notes, because all content in the section is also applicable for vSphere 7.0 Update 3f. Also, see the related VMware knowledge base articles: 8644787258, and 87308.

What’s New

  • This release resolves CVE-2022-23816, CVE-2022-23825, CVE-2022-28693, and CVE-2022-29901. For more information on these vulnerabilities and their impact on VMware products, see VMSA-2022-0020.
  • ESXi 7.0 Update 3f supports vSphere Quick Boot on the following servers:

Cisco Systems Inc:

  • UCSC-C220-M6N
  • UCSC-C225-M6N
  • UCSC-C240-M6L
  • UCSC-C240-M6N
  • UCSC-C240-M6SN
  • UCSC-C240-M6SX

Dell Inc:

  • PowerEdge XR11
  • PowerEdge XR12
  • PowerEdge XE8545
  • HPE:
  • Edgeline e920
  • Edgeline e920d
  • Edgeline e920t
  • ProLiant DL20 Gen10 Plus
  • ProLiant DL110 Gen10 Plus
  • ProLiant ML30 Gen10 Plus
  • Lenovo:
  • ThinkSystem SR 860 V2

Earlier Releases of ESXi 7.0

New features, resolved, and known issues of ESXi are described in the release notes for each release. Release notes for earlier releases of ESXi 7.0 are:

For internationalization, compatibility, and open source components, see the VMware vSphere 7.0 Release Notes.

Patches Contained in This Release

This release of ESXi 7.0 Update 3f delivers the following patches:

Build Details

Download Filename: VMware-ESXi-7.0U3f-20036589-depot
Build: 20036589
Download Size: 575.2 MB
md5sum: 8543deb5d6d71bc7cc6d6c21977b1181
sha256checksum: b4cd253cbc28abfa01fbe8e996c3b0fd8b6be9e442a4631f35616eb34e9e01e9
Host Reboot Required: Yes
Virtual Machine Migration or Shutdown Required: Yes


Component Bulletin Category Severity
ESXi Component – core ESXi VIBs ESXi_7.0.3-0.50.20036589 Bugfix Critical
ESXi Install/Upgrade Component esx-update_7.0.3-0.50.20036589 Bugfix Critical
Broadcom NetXtreme-E Network and ROCE/RDMA Drivers for VMware ESXi Broadcom-bnxt-Net-RoCE_216.0.0.0-1vmw.703.0.50.20036589 Bugfix Critical
Network driver for Intel(R) E810 Adapters Intel-icen_1.4.1.20-1vmw.703.0.50.20036589 Bugfix Critical
Network driver for Intel(R) X722 and E810 based RDMA Adapters Intel-irdman_1.3.1.22-1vmw.703.0.50.20036589 Bugfix Critical
VMware Native iSER Driver VMware-iser_1.1.0.1-1vmw.703.0.50.20036589 Bugfix Critical
Broadcom Emulex Connectivity Division lpfc driver for FC adapters Broadcom-ELX-lpfc_14.0.169.26-5vmw.703.0.50.20036589 Bugfix Critical
LSI NATIVE DRIVERS LSU Management Plugin Broadcom-lsiv2-drivers-plugin_1.0.0-12vmw.703.0.50.20036589 Bugfix Critical
Networking Driver for Intel PRO/1000 Family Adapters Intel-ne1000_0.9.0-1vmw.703.0.50.20036589 Bugfix Critical
USB Driver VMware-vmkusb_0.1-7vmw.703.0.50.20036589 Bugfix Critical
ESXi Component – core ESXi VIBs ESXi_7.0.3-0.45.20036586 Security Critical
ESXi Install/Upgrade Component esx-update_7.0.3-0.45.20036586 Security Critical
VMware-VM-Tools VMware-VM-Tools_12.0.0.19345655-20036586 Security Critical


  • Starting with vSphere 7.0, VMware uses components for packaging VIBs along with bulletins. The ESXiand esx-update bulletins are dependent on each other. Always include both in a single ESXi host patch baseline or include the rollup bulletin in the baseline to avoid failure during host patching.
  • When patching ESXi hosts by using VMware Update Manager from a version prior to ESXi 7.0 Update 2, it is strongly recommended to use the rollup bulletin in the patch baseline. If you cannot use the rollup bulletin, be sure to include all of the following packages in the patching baseline. If the following packages are not included in the baseline, the update operation fails:
  • VMware-vmkusb_0.1-1vmw.701.0.0.16850804 or higher
  • VMware-vmkata_0.1-1vmw.701.0.0.16850804 or higher
  • VMware-vmkfcoe_1.0.0.2-1vmw.701.0.0.16850804 or higher
  • VMware-NVMeoF-RDMA_1.0.1.2-1vmw.701.0.0.16850804 or higher

Rollup Bulletin

This rollup bulletin contains the latest VIBs with all the fixes after the initial release of ESXi 7.0.

Bulletin ID Category Severity
ESXi70U3f-20036589 Bugfix Critical
ESXi70U3sf-20036586 Security Critical

Image Profiles

VMware patch and update releases contain general and critical image profiles. Application of the general release image profile applies to new bug fixes.

Image Profile Name

ESXi Image

Name and Version Release Date Category Detail
ESXi70U3f-20036589 12 JUL 2022 Bugfix Bugfix image
ESXi70U3sf-20036586 12 JUL 2022 Security Security Image

For information about the individual components and bulletins, see the Product Patches page and the Resolved Issues section.

For information about the individual components and bulletins, see the Product Patches page and the Resolved Issues section.

Patch Download and Installation

In vSphere 7.x, the Update Manager plug-in, used for administering vSphere Update Manager, is replaced with the Lifecycle Manager plug-in. Administrative operations for vSphere Update Manager are still available under the Lifecycle Manager plug-in, along with new capabilities for vSphere Lifecycle Manager.
The typical way to apply patches to ESXi 7.x hosts is by using the vSphere Lifecycle Manager. For details, see About vSphere Lifecycle Manager and vSphere Lifecycle Manager Baselines and Images.
You can also update ESXi hosts without using the Lifecycle Manager plug-in, and use an image profile instead. To do this, you must manually download the patch offline bundle ZIP file from VMware Customer Connect. From the Select a Product drop-down menu, select ESXi (Embedded and Installable) and from the Select a Version drop-down menu, select 7.0. For more information, see the Upgrading Hosts by Using ESXCLI Commands and the VMware ESXi Upgrade guide.

Resolved Issues

The resolved issues are grouped as follows.

Known Issues

The known issues are grouped as follows.

vSphere Client Issues

  • BIOS manufacturer displays as “–” in the vSphere Client

In the vSphere Client, when you select an ESXi host and navigate to Configure Hardware Firmware, you see -- instead of the BIOS manufacturer name.

Workaround: For more information, see VMware knowledge base article 88937.

Miscellaneous Issues

  • USB device passthrough from ESXi hosts to virtual machines might fail

A USB modem device might simultaneously claim multiple interfaces by the VMkernel and block the device passthrough to VMs.
Workaround: You must apply the USB.quirks advanced configuration on the ESXi host to ignore the NET interface from VMkernel and allow the USB modem to passthrough to VMs. You can apply the configuration in 3 alternative ways:

  1. Access the ESXi shell and run the following command: esxcli system settings advanced set -o /USB/quirks -s 0xvvvv:0xpppp:0:0xffff:UQ_NET_IGNORE | |- Device Product ID |------- Device Vendor ID
    For example, for the Gemalto M2M GmbH Zoom 4625 Modem(vid:pid/1e2d:005b), you can have the command
    esxcli system settings advanced set -o /USB/quirks -s 0x1e2d:0x005b:0:0xffff:UQ_NET_IGNORE
    Reboot the ESXi host.
  2. Set the advanced configuration from the vSphere Client or the vSphere Web Client and reboot the ESXi host.
  3. Use a Host Profile to apply the advanced configuration.For more information on the steps, see VMware knowledge base article 80416.
100 %
0 %
0 %
0 %
0 %
0 %
0 0 votes
Article Rating
Notify of
1 Comment
Newest Most Voted
Inline Feedbacks
View all comments
3 months ago

Dear Friend,
Anyone have the key of esxi 7.0u3f ?

Would love your thoughts, please comment.x