DSA-2021-265: Dell EMC VxRail Security Update for Apache Log4j Remote Code Execution Vulnerability (CVE-2021-44228 and CVE-2021-45046)

Zusammenfassung: On December 10, 2021, a critical remote code vulnerability was published concerning the Apache Log4j library. Later, CVE-2021-45046 was reported. VxRail is impacted by these vulnerabilities. Fixes and workarounds for CVE-2021-44228 and CVE-2021-45046 are documented in the tables included in this article. ...

Dieser Artikel gilt für Dieser Artikel gilt nicht für Dieser Artikel ist nicht an ein bestimmtes Produkt gebunden. In diesem Artikel werden nicht alle Produktversionen aufgeführt.

Auswirkungen

Critical

Details

Third-party Component CVEs More Information
VMware vCenter CVE-2021-44228
CVE-2021-45046
VMSA-2021-0028.2. See workaround and mitigation table below.
Dell KB article 194372: DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability 
  • Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
  • The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
  • This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
  • For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required. 
  • If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance. 
Third-party Component CVEs More Information
VMware vCenter CVE-2021-44228
CVE-2021-45046
VMSA-2021-0028.2. See workaround and mitigation table below.
Dell KB article 194372: DSN-2021-007: Dell Response to Apache Log4j Remote Code Execution Vulnerability 
  • Note that the full mitigation for VxRail requires both the vCSA workaround as well as the VxRail workaround.
  • The VxRail workaround is applicable to VxRail Manager in VxRail 4.5.x, 4.7.x, and 7.0.x releases along with VxRail Manager in VCF 3.x and 4.x releases.
  • This is an on-going event. Check this advisory for frequent updates.
VxRail environments with customer-supplied vCenter Server or other VMware components and products:
  • For customers with customer-supplied vCenter Server, see VMware article VMware VMSA-2021-0028 for information on workarounds and other remediation steps. Customers can implement workarounds or remediations recommended by VMware in these articles, as required. 
  • If help is required with a customer-supplied vCenter Server or VMware products outside VxRail, reach out to VMware for assistance. For VxRail components, reach out to Dell Support for assistance. 
Dell Technologies empfiehlt allen Kunden, sowohl die CVSS-Gesamtbewertung als auch alle relevanten zeitlichen und umweltbezogenen Bewertungen zu berücksichtigen, die sich auf den potenziellen Schweregrad einer bestimmten Sicherheitsschwachstelle auswirken können.

Betroffene Produkte und Korrektur

Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 4.5.x versions 4.5.471
Dell EMC VxRail Appliance 4.7.x versions 4.7.541
Dell EMC VxRail Appliance 7.0.x versions 7.0.320
Product Affected Versions Updated Versions
Dell EMC VxRail Appliance 4.5.x versions 4.5.471
Dell EMC VxRail Appliance 4.7.x versions 4.7.541
Dell EMC VxRail Appliance 7.0.x versions 7.0.320

Workarounds und Korrekturmaßnahmen

Product Versions CVE Identifiers CVSSv3 Fixed Versions Workarounds
vCenter Server Appliance (vCSA)
VMSA-2021-0028
6.5.x CVE-2021-44228
CVE-2021-45046
Critical VMware vCenter Server 6.5 Update 3s See VMware article KB87081
6.7.x VMware vCenter Server 6.7 Update 3q
7.0.x VMware vCenter Server 7.0 Update 3c
VxRail 4.5.x 4.5.471 Dell KB article 194458: VxRail: VxRail Manager work around to remediate Apache Log4Shell vulnerability (CVE-2021-44228, CVE-2021-45046, and CVE-2021-4104)
4.7.x 4.7.541
7.0.x 7.0.320

Revisionsverlauf

RevisionDateDescription
1.02021-12-14Initial Release
1.12022-02-01Update with VxRail Release 7.0.320
1.22022-02-18Update with VxRail Release 4.7.541
1.32022-03-09Update with VxRail Release 4.5.471

Zugehörige Informationen

Betroffene Produkte

Product Security Information, VxRail 460 and 470 Nodes, VxRail Appliance Family, VxRail Appliance Series, VxRail G410, VxRail G Series Nodes, VxRail D Series Nodes, VxRail D560, VxRail D560F, VxRail E Series Nodes, VxRail E460, VxRail E560 , VxRail E560F, VxRail E560N, VxRail E660, VxRail E660F, VxRail E660N, VxRail E665F, VxRail E665N, VxRail G560, VxRail G560F, VxRail Gen2 Hardware, VxRail P Series Nodes, VxRail P470, VxRail P570, VxRail P570F, VxRail P580N, VxRail P670F, VxRail P675F, VxRail P675N, VxRail S Series Nodes, VxRail S470, VxRail S570, VxRail S670, VxRail Software, VxRail V Series Nodes, VxRail V470, VxRail V570, VxRail V570F, VXRAIL V670F ...
Artikeleigenschaften
Artikelnummer: 000194466
Artikeltyp: Dell Security Advisory
Zuletzt geändert: 19 Sept. 2025
Antworten auf Ihre Fragen erhalten Sie von anderen Dell NutzerInnen
Support Services
Prüfen Sie, ob Ihr Gerät durch Support Services abgedeckt ist.