Recently, we shared information with you regarding a workaround from VMware to address the log4j exploit. The workaround is considered a temporary solution and may not adequately address all attack vectors.
VMware has updated their instructions to indicate they will address the issue in forthcoming releases to vCenter Server. Please refer to the following KB article for details, including the most recent update highlighted at the top of the page: https://kb.vmware.com/s/article/87081
NDG recommends that you plan to update your vCenter Server. As stated in the KB article, VMSA-2021-0028 will be updated when these releases are available.