vCenter Server Services are not displayed on the “vCenter Appliance Availability” Dashboard.

By Lerpong Intaraworrapath | 3rd June 2025

In Aria Operation 8.18, you may monitor vCenter Server services by going to the vCenter Appliance Availability dashboard.

If you do not see vCenter and all its services, please check the VMware Service Lifecycle Manager API in the vCenter Appliance and start these services. (In vCenter Server Management versions 8.0.3 and above, the start type must be set to automated).

Step-by-Step

1.Log in to Aria Operations and go to “Operations” then “Dashboards” to find the “vCenter Appliance Availability” Dashboard.

2.when you click on the vCenter Server. The entire vCenter Server is not visible, and you receive the message “The view cannot be rendered for the specified Object“.

3.Login to the vCenter server Appliance

4.In a Web browser, go to the vCenter Server Appliance Management Interface, https://appliance-IP-address-or-FQDN:5480.

5.You have to start the “VMware Service Lifecycle Manager API” from the vCenter Appliance. (Automated start needs to be performed in vCenter Server Management versions 8.0.3 and above).

6.Navigate to “Services” and select “VMware Service Lifecycle Manager API“.

7.Click “START” and select “SET STARTUP TYPE“.

8.Set Service Startup Type to “Automatic” and click “SET“.

9.Wait 5 to 10 minutes before logging back into Aria Operations and selecting the “vCenter Appliance Availability” dashboard. Select “vCenter Server“, and the vCenter Server services will appear.

Reference

https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/6-7/configuring-vcenter-server-6-7/configuring-vcenter-server-using-the-management-interface/log-in-to-the-vcenter-server-management-interface.html

https://techdocs.broadcom.com/us/en/vmware-cis/aria/aria-operations/8-18/vmware-aria-operations-configuration-guide-8-18/connect-to-data-sources/vmware-infrastructure-health/vcenter-services-in-vmware-infra-health.html

VMSA-2025-0006 | VMware Aria Operations

By Lerpong Intaraworrapath | April 2nd, 2025

VMware Aria Operations updates address a local privilege escalation vulnerability (CVE-2025-22231)

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25541

Advisory ID: VMSA-2025-0006
Advisory Severity:Important
CVSSv3 Range:7.8
Synopsis:VMware Aria Operations updates address a local privilege escalation vulnerability (CVE-2025-22231)
Issue date:2025-04-01
Updated on:2025-04-01 (Initial Advisory)
CVE(s)CVE-2025-22231

Impacted Products:

  • VMware Aria Operations
  • VMware Cloud Foundation
  • VMware Telco Cloud Platform
  • VMware Telco Cloud Infrastructure

Introduction:

A local privilege escalation vulnerability in VMware Aria Operations was responsibly reported to VMware. Patches are available to remediate this vulnerability in affected VMware products. 

Local Privilege escalation vulnerability (CVE-2025-22231)

Description:

 VMware Aria Operations contains a local privilege escalation vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.8.

Known Attack Vectors:

A malicious actor with local administrative privileges can escalate their privileges to root on the appliance running VMware Aria Operations.

Resolution:

To remediate CVE-2025-22231 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.

Workarounds:

None.

Additional Documentation:

None.

Acknowledgements:

VMware would like to thank thiscodecc of MoyunSec Vlab and Bing for reporting this issue to us.

Notes:

None.

Response Matrix:

ProductVersionRunning OnCVECVSSv3SeverityFixed VersionWorkaroundsAddition Documents
VMware Aria Operations8.xAny

CVE-2025-222317.8Important8.18 HF 5NoneNone
VMware Cloud Foundation5.x, 4.xAnyCVE-2025-222317.8ImportantKB articleNoneNone
VMware Telco Cloud Platform5.x, 4.x, 3.xAnyCVE-2025-222317.8Important8.18 HF 5NoneNone
VMware Telco Cloud Infrastructure3.x, 2.xAnyCVE-2025-222317.8Important8.18 HF 5NoneNone

References:

Fixed Version(s) and Release Notes:
Downloads and Documentation

Additional Documentation:

None.

Mitre CVE Dictionary Links:

https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Change Log:

2025-04-01: VMSA-2025-0006
Initial security advisory.

Noted:

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25541